Hay
Date
July 4, 2025, 3:11 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   35.347500] ==================================================================
[   35.352385] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   35.359063] Read of size 1 at addr ffff000803260000 by task kunit_try_catch/282
[   35.366354] 
[   35.367841] CPU: 6 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   35.367896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.367914] Hardware name: WinLink E850-96 board (DT)
[   35.367938] Call trace:
[   35.367952]  show_stack+0x20/0x38 (C)
[   35.367988]  dump_stack_lvl+0x8c/0xd0
[   35.368026]  print_report+0x118/0x608
[   35.368056]  kasan_report+0xdc/0x128
[   35.368085]  __asan_report_load1_noabort+0x20/0x30
[   35.368124]  mempool_uaf_helper+0x314/0x340
[   35.368159]  mempool_page_alloc_uaf+0xc0/0x118
[   35.368192]  kunit_try_run_case+0x170/0x3f0
[   35.368227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.368266]  kthread+0x328/0x630
[   35.368300]  ret_from_fork+0x10/0x20
[   35.368340] 
[   35.435108] The buggy address belongs to the physical page:
[   35.440661] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883260
[   35.448647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.455170] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   35.462887] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.470609] page dumped because: kasan: bad access detected
[   35.476162] 
[   35.477637] Memory state around the buggy address:
[   35.482418]  ffff00080325ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.489620]  ffff00080325ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.496827] >ffff000803260000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.504026]                    ^
[   35.507242]  ffff000803260080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.514446]  ffff000803260100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.521649] ==================================================================
[   34.788938] ==================================================================
[   34.798398] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   34.805081] Read of size 1 at addr ffff000801eb0000 by task kunit_try_catch/278
[   34.812370] 
[   34.813857] CPU: 4 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   34.813913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.813932] Hardware name: WinLink E850-96 board (DT)
[   34.813954] Call trace:
[   34.813967]  show_stack+0x20/0x38 (C)
[   34.814001]  dump_stack_lvl+0x8c/0xd0
[   34.814040]  print_report+0x118/0x608
[   34.814072]  kasan_report+0xdc/0x128
[   34.814103]  __asan_report_load1_noabort+0x20/0x30
[   34.814141]  mempool_uaf_helper+0x314/0x340
[   34.814175]  mempool_kmalloc_large_uaf+0xc4/0x120
[   34.814210]  kunit_try_run_case+0x170/0x3f0
[   34.814247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.814282]  kthread+0x328/0x630
[   34.814320]  ret_from_fork+0x10/0x20
[   34.814356] 
[   34.881380] The buggy address belongs to the physical page:
[   34.886938] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881eb0
[   34.894924] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.902562] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.909505] page_type: f8(unknown)
[   34.912902] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.920621] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   34.928347] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.936159] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   34.943972] head: 0bfffe0000000002 fffffdffe007ac01 00000000ffffffff 00000000ffffffff
[   34.951784] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.959590] page dumped because: kasan: bad access detected
[   34.965145] 
[   34.966620] Memory state around the buggy address:
[   34.971404]  ffff000801eaff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.978603]  ffff000801eaff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.985812] >ffff000801eb0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.993009]                    ^
[   34.996225]  ffff000801eb0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.003429]  ffff000801eb0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.010632] ==================================================================

[   17.657994] ==================================================================
[   17.658057] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   17.658448] Read of size 1 at addr fff00000c7850000 by task kunit_try_catch/238
[   17.658684] 
[   17.658770] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   17.659096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.659124] Hardware name: linux,dummy-virt (DT)
[   17.659170] Call trace:
[   17.659196]  show_stack+0x20/0x38 (C)
[   17.659250]  dump_stack_lvl+0x8c/0xd0
[   17.659366]  print_report+0x118/0x608
[   17.659415]  kasan_report+0xdc/0x128
[   17.659460]  __asan_report_load1_noabort+0x20/0x30
[   17.659530]  mempool_uaf_helper+0x314/0x340
[   17.659581]  mempool_page_alloc_uaf+0xc0/0x118
[   17.659626]  kunit_try_run_case+0x170/0x3f0
[   17.659694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.659759]  kthread+0x328/0x630
[   17.659804]  ret_from_fork+0x10/0x20
[   17.659858] 
[   17.659880] The buggy address belongs to the physical page:
[   17.659912] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107850
[   17.660167] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.660274] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   17.660339] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.660425] page dumped because: kasan: bad access detected
[   17.660493] 
[   17.660656] Memory state around the buggy address:
[   17.660805]  fff00000c784ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.661031]  fff00000c784ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.661169] >fff00000c7850000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.661298]                    ^
[   17.661368]  fff00000c7850080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.661461]  fff00000c7850100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.661557] ==================================================================
[   17.602589] ==================================================================
[   17.603416] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   17.603486] Read of size 1 at addr fff00000c7850000 by task kunit_try_catch/234
[   17.603536] 
[   17.603576] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   17.603679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.603708] Hardware name: linux,dummy-virt (DT)
[   17.603955] Call trace:
[   17.604043]  show_stack+0x20/0x38 (C)
[   17.604127]  dump_stack_lvl+0x8c/0xd0
[   17.604178]  print_report+0x118/0x608
[   17.604229]  kasan_report+0xdc/0x128
[   17.604273]  __asan_report_load1_noabort+0x20/0x30
[   17.604323]  mempool_uaf_helper+0x314/0x340
[   17.604695]  mempool_kmalloc_large_uaf+0xc4/0x120
[   17.604834]  kunit_try_run_case+0x170/0x3f0
[   17.604933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.605279]  kthread+0x328/0x630
[   17.605457]  ret_from_fork+0x10/0x20
[   17.605544] 
[   17.605574] The buggy address belongs to the physical page:
[   17.606027] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107850
[   17.606137] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.606251] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.606305] page_type: f8(unknown)
[   17.606343] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.606726] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.606814] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.607092] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.607267] head: 0bfffe0000000002 ffffc1ffc31e1401 00000000ffffffff 00000000ffffffff
[   17.607356] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.607793] page dumped because: kasan: bad access detected
[   17.607976] 
[   17.608020] Memory state around the buggy address:
[   17.608196]  fff00000c784ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.608243]  fff00000c784ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.608292] >fff00000c7850000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.608332]                    ^
[   17.608361]  fff00000c7850080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.608719]  fff00000c7850100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.608816] ==================================================================

[   16.291009] ==================================================================
[   16.291906] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   16.292605] Read of size 1 at addr ffff8881039d8000 by task kunit_try_catch/254
[   16.293449] 
[   16.293698] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   16.293809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.293841] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.293891] Call Trace:
[   16.293923]  <TASK>
[   16.293966]  dump_stack_lvl+0x73/0xb0
[   16.294037]  print_report+0xd1/0x650
[   16.294103]  ? __virt_addr_valid+0x1db/0x2d0
[   16.294151]  ? mempool_uaf_helper+0x392/0x400
[   16.294196]  ? kasan_addr_to_slab+0x11/0xa0
[   16.294239]  ? mempool_uaf_helper+0x392/0x400
[   16.294295]  kasan_report+0x141/0x180
[   16.294365]  ? mempool_uaf_helper+0x392/0x400
[   16.294427]  __asan_report_load1_noabort+0x18/0x20
[   16.294476]  mempool_uaf_helper+0x392/0x400
[   16.294529]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   16.294576]  ? dequeue_entities+0x852/0x1740
[   16.294638]  ? finish_task_switch.isra.0+0x153/0x700
[   16.294702]  mempool_page_alloc_uaf+0xed/0x140
[   16.294760]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   16.294797]  ? dequeue_task_fair+0x166/0x4e0
[   16.294837]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   16.294878]  ? __pfx_mempool_free_pages+0x10/0x10
[   16.294917]  ? __pfx_read_tsc+0x10/0x10
[   16.294956]  ? ktime_get_ts64+0x86/0x230
[   16.295003]  kunit_try_run_case+0x1a5/0x480
[   16.295052]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.295090]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.295136]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.295164]  ? __kthread_parkme+0x82/0x180
[   16.295192]  ? preempt_count_sub+0x50/0x80
[   16.295236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.295275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.295311]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.295357]  kthread+0x337/0x6f0
[   16.295380]  ? trace_preempt_on+0x20/0xc0
[   16.295410]  ? __pfx_kthread+0x10/0x10
[   16.295431]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.295459]  ? calculate_sigpending+0x7b/0xa0
[   16.295485]  ? __pfx_kthread+0x10/0x10
[   16.295506]  ret_from_fork+0x41/0x80
[   16.295531]  ? __pfx_kthread+0x10/0x10
[   16.295551]  ret_from_fork_asm+0x1a/0x30
[   16.295588]  </TASK>
[   16.295601] 
[   16.307687] The buggy address belongs to the physical page:
[   16.308650] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d8
[   16.309492] flags: 0x200000000000000(node=0|zone=2)
[   16.309976] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   16.310834] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   16.311270] page dumped because: kasan: bad access detected
[   16.311518] 
[   16.311680] Memory state around the buggy address:
[   16.312010]  ffff8881039d7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.312507]  ffff8881039d7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.312900] >ffff8881039d8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.314001]                    ^
[   16.314258]  ffff8881039d8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.314622]  ffff8881039d8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.315074] ==================================================================
[   16.202820] ==================================================================
[   16.203711] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   16.203993] Read of size 1 at addr ffff888103ab4000 by task kunit_try_catch/250
[   16.204393] 
[   16.204539] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   16.204643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.204672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.204757] Call Trace:
[   16.204786]  <TASK>
[   16.204838]  dump_stack_lvl+0x73/0xb0
[   16.204899]  print_report+0xd1/0x650
[   16.204943]  ? __virt_addr_valid+0x1db/0x2d0
[   16.204982]  ? mempool_uaf_helper+0x392/0x400
[   16.205026]  ? kasan_addr_to_slab+0x11/0xa0
[   16.205093]  ? mempool_uaf_helper+0x392/0x400
[   16.205133]  kasan_report+0x141/0x180
[   16.205176]  ? mempool_uaf_helper+0x392/0x400
[   16.205234]  __asan_report_load1_noabort+0x18/0x20
[   16.205283]  mempool_uaf_helper+0x392/0x400
[   16.205352]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   16.205407]  ? dequeue_entities+0x852/0x1740
[   16.205466]  ? finish_task_switch.isra.0+0x153/0x700
[   16.205527]  mempool_kmalloc_large_uaf+0xef/0x140
[   16.205579]  ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10
[   16.205622]  ? dequeue_task_fair+0x166/0x4e0
[   16.205664]  ? __pfx_mempool_kmalloc+0x10/0x10
[   16.205708]  ? __pfx_mempool_kfree+0x10/0x10
[   16.205751]  ? __pfx_read_tsc+0x10/0x10
[   16.205826]  ? ktime_get_ts64+0x86/0x230
[   16.205898]  kunit_try_run_case+0x1a5/0x480
[   16.205954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.206025]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.206104]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.206160]  ? __kthread_parkme+0x82/0x180
[   16.206233]  ? preempt_count_sub+0x50/0x80
[   16.206265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.206290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.206318]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.206364]  kthread+0x337/0x6f0
[   16.206385]  ? trace_preempt_on+0x20/0xc0
[   16.206411]  ? __pfx_kthread+0x10/0x10
[   16.206431]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.206455]  ? calculate_sigpending+0x7b/0xa0
[   16.206480]  ? __pfx_kthread+0x10/0x10
[   16.206502]  ret_from_fork+0x41/0x80
[   16.206524]  ? __pfx_kthread+0x10/0x10
[   16.206544]  ret_from_fork_asm+0x1a/0x30
[   16.206577]  </TASK>
[   16.206590] 
[   16.218210] The buggy address belongs to the physical page:
[   16.218533] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ab4
[   16.219112] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.219650] flags: 0x200000000000040(head|node=0|zone=2)
[   16.220099] page_type: f8(unknown)
[   16.220423] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.220934] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.221523] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.221849] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.222141] head: 0200000000000002 ffffea00040ead01 00000000ffffffff 00000000ffffffff
[   16.222904] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.223475] page dumped because: kasan: bad access detected
[   16.223830] 
[   16.223950] Memory state around the buggy address:
[   16.224159]  ffff888103ab3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.224446]  ffff888103ab3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.224716] >ffff888103ab4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.225295]                    ^
[   16.225619]  ffff888103ab4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.226283]  ffff888103ab4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.226954] ==================================================================