Hay
Date
July 22, 2025, 2:40 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.201316] ==================================================================
[   19.201754] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   19.201848] Read of size 1 at addr fff00000c5b89a00 by task kunit_try_catch/229
[   19.201909] 
[   19.201958] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.202045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.202072] Hardware name: linux,dummy-virt (DT)
[   19.202106] Call trace:
[   19.202310]  show_stack+0x20/0x38 (C)
[   19.202381]  dump_stack_lvl+0x8c/0xd0
[   19.202443]  print_report+0x118/0x5d0
[   19.202487]  kasan_report+0xdc/0x128
[   19.202587]  __asan_report_load1_noabort+0x20/0x30
[   19.202644]  mempool_uaf_helper+0x314/0x340
[   19.202692]  mempool_kmalloc_uaf+0xc4/0x120
[   19.202795]  kunit_try_run_case+0x170/0x3f0
[   19.202847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.202927]  kthread+0x328/0x630
[   19.203043]  ret_from_fork+0x10/0x20
[   19.203302] 
[   19.203322] Allocated by task 229:
[   19.203431]  kasan_save_stack+0x3c/0x68
[   19.203487]  kasan_save_track+0x20/0x40
[   19.203526]  kasan_save_alloc_info+0x40/0x58
[   19.203565]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.203995]  remove_element+0x130/0x1f8
[   19.204077]  mempool_alloc_preallocated+0x58/0xc0
[   19.204144]  mempool_uaf_helper+0xa4/0x340
[   19.204300]  mempool_kmalloc_uaf+0xc4/0x120
[   19.204369]  kunit_try_run_case+0x170/0x3f0
[   19.204494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.204539]  kthread+0x328/0x630
[   19.204606]  ret_from_fork+0x10/0x20
[   19.204940] 
[   19.204999] Freed by task 229:
[   19.205069]  kasan_save_stack+0x3c/0x68
[   19.205142]  kasan_save_track+0x20/0x40
[   19.205243]  kasan_save_free_info+0x4c/0x78
[   19.205371]  __kasan_mempool_poison_object+0xc0/0x150
[   19.205437]  mempool_free+0x28c/0x328
[   19.205500]  mempool_uaf_helper+0x104/0x340
[   19.205794]  mempool_kmalloc_uaf+0xc4/0x120
[   19.205863]  kunit_try_run_case+0x170/0x3f0
[   19.205937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.206143]  kthread+0x328/0x630
[   19.206190]  ret_from_fork+0x10/0x20
[   19.206303] 
[   19.206354] The buggy address belongs to the object at fff00000c5b89a00
[   19.206354]  which belongs to the cache kmalloc-128 of size 128
[   19.206505] The buggy address is located 0 bytes inside of
[   19.206505]  freed 128-byte region [fff00000c5b89a00, fff00000c5b89a80)
[   19.206587] 
[   19.206612] The buggy address belongs to the physical page:
[   19.206660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b89
[   19.206993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.207132] page_type: f5(slab)
[   19.207209] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.207361] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.207443] page dumped because: kasan: bad access detected
[   19.207551] 
[   19.207599] Memory state around the buggy address:
[   19.207647]  fff00000c5b89900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.207695]  fff00000c5b89980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.207738] >fff00000c5b89a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.207958]                    ^
[   19.208013]  fff00000c5b89a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.208064]  fff00000c5b89b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.208130] ==================================================================
[   19.233168] ==================================================================
[   19.233230] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   19.233300] Read of size 1 at addr fff00000c78f9240 by task kunit_try_catch/233
[   19.233353] 
[   19.233630] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.233878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.233909] Hardware name: linux,dummy-virt (DT)
[   19.233943] Call trace:
[   19.234050]  show_stack+0x20/0x38 (C)
[   19.234113]  dump_stack_lvl+0x8c/0xd0
[   19.234167]  print_report+0x118/0x5d0
[   19.234273]  kasan_report+0xdc/0x128
[   19.234359]  __asan_report_load1_noabort+0x20/0x30
[   19.234690]  mempool_uaf_helper+0x314/0x340
[   19.234879]  mempool_slab_uaf+0xc0/0x118
[   19.235001]  kunit_try_run_case+0x170/0x3f0
[   19.235078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.235234]  kthread+0x328/0x630
[   19.235469]  ret_from_fork+0x10/0x20
[   19.235527] 
[   19.235545] Allocated by task 233:
[   19.235574]  kasan_save_stack+0x3c/0x68
[   19.235691]  kasan_save_track+0x20/0x40
[   19.235750]  kasan_save_alloc_info+0x40/0x58
[   19.235865]  __kasan_mempool_unpoison_object+0xbc/0x180
[   19.235943]  remove_element+0x16c/0x1f8
[   19.235989]  mempool_alloc_preallocated+0x58/0xc0
[   19.236362]  mempool_uaf_helper+0xa4/0x340
[   19.236441]  mempool_slab_uaf+0xc0/0x118
[   19.236542]  kunit_try_run_case+0x170/0x3f0
[   19.236622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.236667]  kthread+0x328/0x630
[   19.236732]  ret_from_fork+0x10/0x20
[   19.236903] 
[   19.236923] Freed by task 233:
[   19.237110]  kasan_save_stack+0x3c/0x68
[   19.237183]  kasan_save_track+0x20/0x40
[   19.237323]  kasan_save_free_info+0x4c/0x78
[   19.237393]  __kasan_mempool_poison_object+0xc0/0x150
[   19.237465]  mempool_free+0x28c/0x328
[   19.237597]  mempool_uaf_helper+0x104/0x340
[   19.237664]  mempool_slab_uaf+0xc0/0x118
[   19.237792]  kunit_try_run_case+0x170/0x3f0
[   19.237892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.237956]  kthread+0x328/0x630
[   19.238157]  ret_from_fork+0x10/0x20
[   19.238201] 
[   19.238253] The buggy address belongs to the object at fff00000c78f9240
[   19.238253]  which belongs to the cache test_cache of size 123
[   19.238434] The buggy address is located 0 bytes inside of
[   19.238434]  freed 123-byte region [fff00000c78f9240, fff00000c78f92bb)
[   19.238520] 
[   19.238606] The buggy address belongs to the physical page:
[   19.238666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078f9
[   19.238934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.238990] page_type: f5(slab)
[   19.239146] raw: 0bfffe0000000000 fff00000c5971500 dead000000000122 0000000000000000
[   19.239246] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   19.239355] page dumped because: kasan: bad access detected
[   19.239412] 
[   19.239452] Memory state around the buggy address:
[   19.239566]  fff00000c78f9100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.239679]  fff00000c78f9180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.239745] >fff00000c78f9200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   19.239939]                                            ^
[   19.239991]  fff00000c78f9280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.240034]  fff00000c78f9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.240087] ==================================================================

[   12.714939] ==================================================================
[   12.716081] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   12.716730] Read of size 1 at addr ffff888103d00240 by task kunit_try_catch/251
[   12.717443] 
[   12.717627] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   12.717672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.717684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.717704] Call Trace:
[   12.717715]  <TASK>
[   12.717730]  dump_stack_lvl+0x73/0xb0
[   12.717756]  print_report+0xd1/0x610
[   12.717778]  ? __virt_addr_valid+0x1db/0x2d0
[   12.717800]  ? mempool_uaf_helper+0x392/0x400
[   12.717822]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.717845]  ? mempool_uaf_helper+0x392/0x400
[   12.717867]  kasan_report+0x141/0x180
[   12.717889]  ? mempool_uaf_helper+0x392/0x400
[   12.717916]  __asan_report_load1_noabort+0x18/0x20
[   12.717937]  mempool_uaf_helper+0x392/0x400
[   12.717960]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   12.717982]  ? update_load_avg+0x1be/0x21b0
[   12.718007]  ? finish_task_switch.isra.0+0x153/0x700
[   12.718033]  mempool_slab_uaf+0xea/0x140
[   12.718052]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   12.718071]  ? dequeue_task_fair+0x156/0x4e0
[   12.718097]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   12.718119]  ? __pfx_mempool_free_slab+0x10/0x10
[   12.718142]  ? __pfx_read_tsc+0x10/0x10
[   12.718161]  ? ktime_get_ts64+0x86/0x230
[   12.718186]  kunit_try_run_case+0x1a5/0x480
[   12.718208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.718238]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.718259]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.718283]  ? __kthread_parkme+0x82/0x180
[   12.718305]  ? preempt_count_sub+0x50/0x80
[   12.718329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.718349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.718383]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.718406]  kthread+0x337/0x6f0
[   12.718423]  ? trace_preempt_on+0x20/0xc0
[   12.718448]  ? __pfx_kthread+0x10/0x10
[   12.718465]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.718486]  ? calculate_sigpending+0x7b/0xa0
[   12.718508]  ? __pfx_kthread+0x10/0x10
[   12.718526]  ret_from_fork+0x41/0x80
[   12.718546]  ? __pfx_kthread+0x10/0x10
[   12.718564]  ret_from_fork_asm+0x1a/0x30
[   12.718594]  </TASK>
[   12.718605] 
[   12.729447] Allocated by task 251:
[   12.729707]  kasan_save_stack+0x45/0x70
[   12.729855]  kasan_save_track+0x18/0x40
[   12.729989]  kasan_save_alloc_info+0x3b/0x50
[   12.730135]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   12.730319]  remove_element+0x11e/0x190
[   12.730561]  mempool_alloc_preallocated+0x4d/0x90
[   12.730784]  mempool_uaf_helper+0x96/0x400
[   12.730982]  mempool_slab_uaf+0xea/0x140
[   12.731169]  kunit_try_run_case+0x1a5/0x480
[   12.731403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.731631]  kthread+0x337/0x6f0
[   12.731791]  ret_from_fork+0x41/0x80
[   12.731928]  ret_from_fork_asm+0x1a/0x30
[   12.732064] 
[   12.732132] Freed by task 251:
[   12.732447]  kasan_save_stack+0x45/0x70
[   12.732654]  kasan_save_track+0x18/0x40
[   12.732897]  kasan_save_free_info+0x3f/0x60
[   12.733110]  __kasan_mempool_poison_object+0x131/0x1d0
[   12.733372]  mempool_free+0x2ec/0x380
[   12.733559]  mempool_uaf_helper+0x11a/0x400
[   12.733934]  mempool_slab_uaf+0xea/0x140
[   12.734117]  kunit_try_run_case+0x1a5/0x480
[   12.734273]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.734750]  kthread+0x337/0x6f0
[   12.734899]  ret_from_fork+0x41/0x80
[   12.735059]  ret_from_fork_asm+0x1a/0x30
[   12.735259] 
[   12.735336] The buggy address belongs to the object at ffff888103d00240
[   12.735336]  which belongs to the cache test_cache of size 123
[   12.736049] The buggy address is located 0 bytes inside of
[   12.736049]  freed 123-byte region [ffff888103d00240, ffff888103d002bb)
[   12.736564] 
[   12.736646] The buggy address belongs to the physical page:
[   12.736835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   12.737186] flags: 0x200000000000000(node=0|zone=2)
[   12.737523] page_type: f5(slab)
[   12.737678] raw: 0200000000000000 ffff8881014e3640 dead000000000122 0000000000000000
[   12.737977] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   12.738201] page dumped because: kasan: bad access detected
[   12.738381] 
[   12.738449] Memory state around the buggy address:
[   12.738601]  ffff888103d00100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.738816]  ffff888103d00180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.739131] >ffff888103d00200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   12.739769]                                            ^
[   12.740031]  ffff888103d00280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.740360]  ffff888103d00300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.740717] ==================================================================
[   12.644901] ==================================================================
[   12.645973] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   12.646219] Read of size 1 at addr ffff888103cfc100 by task kunit_try_catch/247
[   12.646928] 
[   12.647128] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   12.647174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.647186] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.647206] Call Trace:
[   12.647218]  <TASK>
[   12.647244]  dump_stack_lvl+0x73/0xb0
[   12.647269]  print_report+0xd1/0x610
[   12.647292]  ? __virt_addr_valid+0x1db/0x2d0
[   12.647313]  ? mempool_uaf_helper+0x392/0x400
[   12.647334]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.647378]  ? mempool_uaf_helper+0x392/0x400
[   12.647400]  kasan_report+0x141/0x180
[   12.647444]  ? mempool_uaf_helper+0x392/0x400
[   12.647472]  __asan_report_load1_noabort+0x18/0x20
[   12.647492]  mempool_uaf_helper+0x392/0x400
[   12.647515]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   12.647539]  ? kasan_save_track+0x18/0x40
[   12.647558]  ? kasan_save_alloc_info+0x3b/0x50
[   12.647577]  ? kasan_save_stack+0x45/0x70
[   12.647602]  mempool_kmalloc_uaf+0xef/0x140
[   12.647624]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   12.647646]  ? dequeue_task_fair+0x166/0x4e0
[   12.647687]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.647708]  ? __pfx_mempool_kfree+0x10/0x10
[   12.647729]  ? __pfx_read_tsc+0x10/0x10
[   12.647749]  ? ktime_get_ts64+0x86/0x230
[   12.647774]  kunit_try_run_case+0x1a5/0x480
[   12.647795]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.647813]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.647833]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.647857]  ? __kthread_parkme+0x82/0x180
[   12.647878]  ? preempt_count_sub+0x50/0x80
[   12.647902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.647922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.647945]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.647968]  kthread+0x337/0x6f0
[   12.647984]  ? trace_preempt_on+0x20/0xc0
[   12.648007]  ? __pfx_kthread+0x10/0x10
[   12.648024]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.648046]  ? calculate_sigpending+0x7b/0xa0
[   12.648068]  ? __pfx_kthread+0x10/0x10
[   12.648086]  ret_from_fork+0x41/0x80
[   12.648106]  ? __pfx_kthread+0x10/0x10
[   12.648124]  ret_from_fork_asm+0x1a/0x30
[   12.648155]  </TASK>
[   12.648165] 
[   12.663524] Allocated by task 247:
[   12.663900]  kasan_save_stack+0x45/0x70
[   12.664323]  kasan_save_track+0x18/0x40
[   12.664686]  kasan_save_alloc_info+0x3b/0x50
[   12.664838]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   12.665022]  remove_element+0x11e/0x190
[   12.665160]  mempool_alloc_preallocated+0x4d/0x90
[   12.665342]  mempool_uaf_helper+0x96/0x400
[   12.665548]  mempool_kmalloc_uaf+0xef/0x140
[   12.665764]  kunit_try_run_case+0x1a5/0x480
[   12.666131]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.666390]  kthread+0x337/0x6f0
[   12.666508]  ret_from_fork+0x41/0x80
[   12.666655]  ret_from_fork_asm+0x1a/0x30
[   12.666808] 
[   12.666876] Freed by task 247:
[   12.667213]  kasan_save_stack+0x45/0x70
[   12.667583]  kasan_save_track+0x18/0x40
[   12.668078]  kasan_save_free_info+0x3f/0x60
[   12.668513]  __kasan_mempool_poison_object+0x131/0x1d0
[   12.669077]  mempool_free+0x2ec/0x380
[   12.669514]  mempool_uaf_helper+0x11a/0x400
[   12.669748]  mempool_kmalloc_uaf+0xef/0x140
[   12.670125]  kunit_try_run_case+0x1a5/0x480
[   12.670544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.670924]  kthread+0x337/0x6f0
[   12.671307]  ret_from_fork+0x41/0x80
[   12.671673]  ret_from_fork_asm+0x1a/0x30
[   12.671937] 
[   12.672009] The buggy address belongs to the object at ffff888103cfc100
[   12.672009]  which belongs to the cache kmalloc-128 of size 128
[   12.672380] The buggy address is located 0 bytes inside of
[   12.672380]  freed 128-byte region [ffff888103cfc100, ffff888103cfc180)
[   12.673476] 
[   12.673640] The buggy address belongs to the physical page:
[   12.674198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103cfc
[   12.674996] flags: 0x200000000000000(node=0|zone=2)
[   12.675816] page_type: f5(slab)
[   12.676047] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.676294] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.676899] page dumped because: kasan: bad access detected
[   12.677413] 
[   12.677569] Memory state around the buggy address:
[   12.678031]  ffff888103cfc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.678684]  ffff888103cfc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.679011] >ffff888103cfc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.679980]                    ^
[   12.680356]  ffff888103cfc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.681148]  ffff888103cfc200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.681523] ==================================================================