Hay
Date
April 20, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   25.957706] ==================================================================
[   25.957836] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   25.958060] Read of size 1 at addr fff00000c67e5240 by task kunit_try_catch/233
[   25.958183] 
[   25.958362] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.958685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.958808] Hardware name: linux,dummy-virt (DT)
[   25.958907] Call trace:
[   25.959053]  show_stack+0x20/0x38 (C)
[   25.959179]  dump_stack_lvl+0x8c/0xd0
[   25.959297]  print_report+0x118/0x608
[   25.959408]  kasan_report+0xdc/0x128
[   25.959516]  __asan_report_load1_noabort+0x20/0x30
[   25.959718]  mempool_uaf_helper+0x314/0x340
[   25.959994]  mempool_slab_uaf+0xc0/0x118
[   25.960204]  kunit_try_run_case+0x170/0x3f0
[   25.960489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.960633]  kthread+0x328/0x630
[   25.960812]  ret_from_fork+0x10/0x20
[   25.960962] 
[   25.961051] Allocated by task 233:
[   25.961178]  kasan_save_stack+0x3c/0x68
[   25.961285]  kasan_save_track+0x20/0x40
[   25.961479]  kasan_save_alloc_info+0x40/0x58
[   25.961667]  __kasan_mempool_unpoison_object+0xbc/0x180
[   25.961867]  remove_element+0x16c/0x1f8
[   25.962146]  mempool_alloc_preallocated+0x58/0xc0
[   25.962268]  mempool_uaf_helper+0xa4/0x340
[   25.962381]  mempool_slab_uaf+0xc0/0x118
[   25.962647]  kunit_try_run_case+0x170/0x3f0
[   25.962799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.963112]  kthread+0x328/0x630
[   25.963271]  ret_from_fork+0x10/0x20
[   25.963411] 
[   25.963508] Freed by task 233:
[   25.963636]  kasan_save_stack+0x3c/0x68
[   25.963788]  kasan_save_track+0x20/0x40
[   25.963975]  kasan_save_free_info+0x4c/0x78
[   25.964094]  __kasan_mempool_poison_object+0xc0/0x150
[   25.964205]  mempool_free+0x28c/0x328
[   25.964369]  mempool_uaf_helper+0x104/0x340
[   25.964604]  mempool_slab_uaf+0xc0/0x118
[   25.964720]  kunit_try_run_case+0x170/0x3f0
[   25.964887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.965061]  kthread+0x328/0x630
[   25.965165]  ret_from_fork+0x10/0x20
[   25.965264] 
[   25.965311] The buggy address belongs to the object at fff00000c67e5240
[   25.965311]  which belongs to the cache test_cache of size 123
[   25.965449] The buggy address is located 0 bytes inside of
[   25.965449]  freed 123-byte region [fff00000c67e5240, fff00000c67e52bb)
[   25.965750] 
[   25.967026] The buggy address belongs to the physical page:
[   25.967113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067e5
[   25.967974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.968105] page_type: f5(slab)
[   25.968203] raw: 0bfffe0000000000 fff00000c7617140 dead000000000122 0000000000000000
[   25.968809] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   25.969016] page dumped because: kasan: bad access detected
[   25.969172] 
[   25.969223] Memory state around the buggy address:
[   25.969587]  fff00000c67e5100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.970005]  fff00000c67e5180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.970562] >fff00000c67e5200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   25.971197]                                            ^
[   25.971895]  fff00000c67e5280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.972031]  fff00000c67e5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.972127] ==================================================================
[   25.883346] ==================================================================
[   25.883572] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   25.883812] Read of size 1 at addr fff00000c6600c00 by task kunit_try_catch/229
[   25.884066] 
[   25.884255] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.884562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.885080] Hardware name: linux,dummy-virt (DT)
[   25.885169] Call trace:
[   25.885228]  show_stack+0x20/0x38 (C)
[   25.885357]  dump_stack_lvl+0x8c/0xd0
[   25.885491]  print_report+0x118/0x608
[   25.885706]  kasan_report+0xdc/0x128
[   25.885898]  __asan_report_load1_noabort+0x20/0x30
[   25.886059]  mempool_uaf_helper+0x314/0x340
[   25.886300]  mempool_kmalloc_uaf+0xc4/0x120
[   25.886519]  kunit_try_run_case+0x170/0x3f0
[   25.886650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.886987]  kthread+0x328/0x630
[   25.887106]  ret_from_fork+0x10/0x20
[   25.887274] 
[   25.887390] Allocated by task 229:
[   25.887539]  kasan_save_stack+0x3c/0x68
[   25.887651]  kasan_save_track+0x20/0x40
[   25.887773]  kasan_save_alloc_info+0x40/0x58
[   25.887949]  __kasan_mempool_unpoison_object+0x11c/0x180
[   25.888105]  remove_element+0x130/0x1f8
[   25.888233]  mempool_alloc_preallocated+0x58/0xc0
[   25.888383]  mempool_uaf_helper+0xa4/0x340
[   25.888497]  mempool_kmalloc_uaf+0xc4/0x120
[   25.888661]  kunit_try_run_case+0x170/0x3f0
[   25.888806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.888977]  kthread+0x328/0x630
[   25.889151]  ret_from_fork+0x10/0x20
[   25.889298] 
[   25.889346] Freed by task 229:
[   25.889429]  kasan_save_stack+0x3c/0x68
[   25.889617]  kasan_save_track+0x20/0x40
[   25.889812]  kasan_save_free_info+0x4c/0x78
[   25.889968]  __kasan_mempool_poison_object+0xc0/0x150
[   25.890088]  mempool_free+0x28c/0x328
[   25.890247]  mempool_uaf_helper+0x104/0x340
[   25.890420]  mempool_kmalloc_uaf+0xc4/0x120
[   25.890734]  kunit_try_run_case+0x170/0x3f0
[   25.891111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.891399]  kthread+0x328/0x630
[   25.891542]  ret_from_fork+0x10/0x20
[   25.891641] 
[   25.891718] The buggy address belongs to the object at fff00000c6600c00
[   25.891718]  which belongs to the cache kmalloc-128 of size 128
[   25.891924] The buggy address is located 0 bytes inside of
[   25.891924]  freed 128-byte region [fff00000c6600c00, fff00000c6600c80)
[   25.892593] 
[   25.892690] The buggy address belongs to the physical page:
[   25.892769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106600
[   25.892895] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.893032] page_type: f5(slab)
[   25.893121] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.893240] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.893370] page dumped because: kasan: bad access detected
[   25.893543] 
[   25.893588] Memory state around the buggy address:
[   25.893666]  fff00000c6600b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.893765]  fff00000c6600b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.893867] >fff00000c6600c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.893977]                    ^
[   25.894047]  fff00000c6600c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.894147]  fff00000c6600d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.894240] ==================================================================

[   12.990910] ==================================================================
[   12.991366] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   12.992506] Read of size 1 at addr ffff888102b49500 by task kunit_try_catch/247
[   12.993351] 
[   12.993689] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   12.993741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.993754] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.993780] Call Trace:
[   12.993794]  <TASK>
[   12.993845]  dump_stack_lvl+0x73/0xb0
[   12.993876]  print_report+0xd1/0x650
[   12.993900]  ? __virt_addr_valid+0x1db/0x2d0
[   12.993923]  ? mempool_uaf_helper+0x392/0x400
[   12.993945]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.993969]  ? mempool_uaf_helper+0x392/0x400
[   12.993992]  kasan_report+0x141/0x180
[   12.994015]  ? mempool_uaf_helper+0x392/0x400
[   12.994044]  __asan_report_load1_noabort+0x18/0x20
[   12.994065]  mempool_uaf_helper+0x392/0x400
[   12.994089]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   12.994112]  ? dequeue_entities+0xa24/0x1790
[   12.994263]  ? finish_task_switch.isra.0+0x153/0x700
[   12.994295]  mempool_kmalloc_uaf+0xef/0x140
[   12.994319]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   12.994351]  ? dequeue_task_fair+0x166/0x4e0
[   12.994374]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.994398]  ? __pfx_mempool_kfree+0x10/0x10
[   12.994421]  ? __pfx_read_tsc+0x10/0x10
[   12.994442]  ? ktime_get_ts64+0x86/0x230
[   12.994468]  kunit_try_run_case+0x1a5/0x480
[   12.994494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.994516]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.994540]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.994565]  ? __kthread_parkme+0x82/0x180
[   12.994586]  ? preempt_count_sub+0x50/0x80
[   12.994612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.994635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.994658]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.994682]  kthread+0x337/0x6f0
[   12.994703]  ? trace_preempt_on+0x20/0xc0
[   12.994727]  ? __pfx_kthread+0x10/0x10
[   12.994749]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.994771]  ? calculate_sigpending+0x7b/0xa0
[   12.994794]  ? __pfx_kthread+0x10/0x10
[   12.994817]  ret_from_fork+0x41/0x80
[   12.994838]  ? __pfx_kthread+0x10/0x10
[   12.994860]  ret_from_fork_asm+0x1a/0x30
[   12.994893]  </TASK>
[   12.994904] 
[   13.010149] Allocated by task 247:
[   13.010598]  kasan_save_stack+0x45/0x70
[   13.011009]  kasan_save_track+0x18/0x40
[   13.011622]  kasan_save_alloc_info+0x3b/0x50
[   13.012092]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.012487]  remove_element+0x11e/0x190
[   13.012818]  mempool_alloc_preallocated+0x4d/0x90
[   13.012978]  mempool_uaf_helper+0x96/0x400
[   13.013120]  mempool_kmalloc_uaf+0xef/0x140
[   13.013537]  kunit_try_run_case+0x1a5/0x480
[   13.013987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.014546]  kthread+0x337/0x6f0
[   13.014957]  ret_from_fork+0x41/0x80
[   13.015175]  ret_from_fork_asm+0x1a/0x30
[   13.015632] 
[   13.015795] Freed by task 247:
[   13.016046]  kasan_save_stack+0x45/0x70
[   13.016623]  kasan_save_track+0x18/0x40
[   13.016852]  kasan_save_free_info+0x3f/0x60
[   13.016997]  __kasan_mempool_poison_object+0x131/0x1d0
[   13.017220]  mempool_free+0x2ec/0x380
[   13.017626]  mempool_uaf_helper+0x11a/0x400
[   13.018036]  mempool_kmalloc_uaf+0xef/0x140
[   13.018540]  kunit_try_run_case+0x1a5/0x480
[   13.018937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.019468]  kthread+0x337/0x6f0
[   13.019597]  ret_from_fork+0x41/0x80
[   13.019727]  ret_from_fork_asm+0x1a/0x30
[   13.019870] 
[   13.019941] The buggy address belongs to the object at ffff888102b49500
[   13.019941]  which belongs to the cache kmalloc-128 of size 128
[   13.020339] The buggy address is located 0 bytes inside of
[   13.020339]  freed 128-byte region [ffff888102b49500, ffff888102b49580)
[   13.021092] 
[   13.021220] The buggy address belongs to the physical page:
[   13.021632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   13.021882] flags: 0x200000000000000(node=0|zone=2)
[   13.022435] page_type: f5(slab)
[   13.022613] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.022912] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.023345] page dumped because: kasan: bad access detected
[   13.023728] 
[   13.023847] Memory state around the buggy address:
[   13.024026]  ffff888102b49400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.024409]  ffff888102b49480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.024764] >ffff888102b49500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.025071]                    ^
[   13.025231]  ffff888102b49580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.025539]  ffff888102b49600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.025898] ==================================================================
[   13.062254] ==================================================================
[   13.062854] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   13.063095] Read of size 1 at addr ffff888102756240 by task kunit_try_catch/251
[   13.063799] 
[   13.063979] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.064026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.064037] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.064059] Call Trace:
[   13.064071]  <TASK>
[   13.064087]  dump_stack_lvl+0x73/0xb0
[   13.064116]  print_report+0xd1/0x650
[   13.064139]  ? __virt_addr_valid+0x1db/0x2d0
[   13.064162]  ? mempool_uaf_helper+0x392/0x400
[   13.064184]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.064207]  ? mempool_uaf_helper+0x392/0x400
[   13.064230]  kasan_report+0x141/0x180
[   13.064252]  ? mempool_uaf_helper+0x392/0x400
[   13.064280]  __asan_report_load1_noabort+0x18/0x20
[   13.064300]  mempool_uaf_helper+0x392/0x400
[   13.064339]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   13.064365]  ? irqentry_exit+0x2a/0x60
[   13.064385]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.064413]  mempool_slab_uaf+0xea/0x140
[   13.064433]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   13.064467]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   13.064489]  ? __pfx_mempool_free_slab+0x10/0x10
[   13.064510]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   13.064532]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   13.064553]  kunit_try_run_case+0x1a5/0x480
[   13.064580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.064603]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.064626]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.064650]  ? __kthread_parkme+0x82/0x180
[   13.064672]  ? preempt_count_sub+0x50/0x80
[   13.064697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.064720]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.064743]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.064766]  kthread+0x337/0x6f0
[   13.064786]  ? trace_preempt_on+0x20/0xc0
[   13.064810]  ? __pfx_kthread+0x10/0x10
[   13.064831]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.064853]  ? calculate_sigpending+0x7b/0xa0
[   13.064875]  ? __pfx_kthread+0x10/0x10
[   13.064897]  ret_from_fork+0x41/0x80
[   13.064919]  ? __pfx_kthread+0x10/0x10
[   13.064940]  ret_from_fork_asm+0x1a/0x30
[   13.064972]  </TASK>
[   13.064983] 
[   13.078106] Allocated by task 251:
[   13.078449]  kasan_save_stack+0x45/0x70
[   13.078897]  kasan_save_track+0x18/0x40
[   13.079281]  kasan_save_alloc_info+0x3b/0x50
[   13.079759]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   13.079951]  remove_element+0x11e/0x190
[   13.080087]  mempool_alloc_preallocated+0x4d/0x90
[   13.080407]  mempool_uaf_helper+0x96/0x400
[   13.080826]  mempool_slab_uaf+0xea/0x140
[   13.081220]  kunit_try_run_case+0x1a5/0x480
[   13.081665]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.082142]  kthread+0x337/0x6f0
[   13.082490]  ret_from_fork+0x41/0x80
[   13.082661]  ret_from_fork_asm+0x1a/0x30
[   13.082801] 
[   13.082871] Freed by task 251:
[   13.082980]  kasan_save_stack+0x45/0x70
[   13.083114]  kasan_save_track+0x18/0x40
[   13.083545]  kasan_save_free_info+0x3f/0x60
[   13.083913]  __kasan_mempool_poison_object+0x131/0x1d0
[   13.084507]  mempool_free+0x2ec/0x380
[   13.084839]  mempool_uaf_helper+0x11a/0x400
[   13.085222]  mempool_slab_uaf+0xea/0x140
[   13.085632]  kunit_try_run_case+0x1a5/0x480
[   13.086019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.086546]  kthread+0x337/0x6f0
[   13.086674]  ret_from_fork+0x41/0x80
[   13.086803]  ret_from_fork_asm+0x1a/0x30
[   13.086941] 
[   13.087011] The buggy address belongs to the object at ffff888102756240
[   13.087011]  which belongs to the cache test_cache of size 123
[   13.087393] The buggy address is located 0 bytes inside of
[   13.087393]  freed 123-byte region [ffff888102756240, ffff8881027562bb)
[   13.087942] 
[   13.088040] The buggy address belongs to the physical page:
[   13.088282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102756
[   13.088734] flags: 0x200000000000000(node=0|zone=2)
[   13.088949] page_type: f5(slab)
[   13.089071] raw: 0200000000000000 ffff888101a70780 dead000000000122 0000000000000000
[   13.089848] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   13.090130] page dumped because: kasan: bad access detected
[   13.090413] 
[   13.090495] Memory state around the buggy address:
[   13.090648]  ffff888102756100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.090963]  ffff888102756180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.091629] >ffff888102756200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   13.091923]                                            ^
[   13.092154]  ffff888102756280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.092428]  ffff888102756300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.092727] ==================================================================

[   23.148568] ==================================================================
[   23.149688] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   23.150377] Read of size 1 at addr ffff0000101ea240 by task kunit_try_catch/285
[   23.151056] 
[   23.151222] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.151272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.151287] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.151304] Call trace:
[   23.151317]  show_stack+0x20/0x38 (C)
[   23.151349]  dump_stack_lvl+0x8c/0xd0
[   23.151381]  print_report+0x118/0x608
[   23.151411]  kasan_report+0xdc/0x128
[   23.151439]  __asan_report_load1_noabort+0x20/0x30
[   23.151473]  mempool_uaf_helper+0x314/0x340
[   23.151507]  mempool_slab_uaf+0xc0/0x118
[   23.151536]  kunit_try_run_case+0x170/0x3f0
[   23.151571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.151610]  kthread+0x328/0x630
[   23.151645]  ret_from_fork+0x10/0x20
[   23.151678] 
[   23.157609] Allocated by task 285:
[   23.157935]  kasan_save_stack+0x3c/0x68
[   23.158312]  kasan_save_track+0x20/0x40
[   23.158694]  kasan_save_alloc_info+0x40/0x58
[   23.159119]  __kasan_mempool_unpoison_object+0xbc/0x180
[   23.159628]  remove_element+0x16c/0x1f8
[   23.160017]  mempool_alloc_preallocated+0x58/0xc0
[   23.160483]  mempool_uaf_helper+0xa4/0x340
[   23.160894]  mempool_slab_uaf+0xc0/0x118
[   23.161283]  kunit_try_run_case+0x170/0x3f0
[   23.161701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.162237]  kthread+0x328/0x630
[   23.162572]  ret_from_fork+0x10/0x20
[   23.162933] 
[   23.163093] Freed by task 285:
[   23.163394]  kasan_save_stack+0x3c/0x68
[   23.163774]  kasan_save_track+0x20/0x40
[   23.164155]  kasan_save_free_info+0x4c/0x78
[   23.164570]  __kasan_mempool_poison_object+0xc0/0x150
[   23.165061]  mempool_free+0x28c/0x328
[   23.165432]  mempool_uaf_helper+0x104/0x340
[   23.165850]  mempool_slab_uaf+0xc0/0x118
[   23.166237]  kunit_try_run_case+0x170/0x3f0
[   23.166654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.167191]  kthread+0x328/0x630
[   23.167523]  ret_from_fork+0x10/0x20
[   23.167881] 
[   23.168040] The buggy address belongs to the object at ffff0000101ea240
[   23.168040]  which belongs to the cache test_cache of size 123
[   23.169176] The buggy address is located 0 bytes inside of
[   23.169176]  freed 123-byte region [ffff0000101ea240, ffff0000101ea2bb)
[   23.170288] 
[   23.170448] The buggy address belongs to the physical page:
[   23.170972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea
[   23.171715] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.172337] page_type: f5(slab)
[   23.172660] raw: 03fffe0000000000 ffff000000d1bb80 dead000000000122 0000000000000000
[   23.173389] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   23.174105] page dumped because: kasan: bad access detected
[   23.174629] 
[   23.174787] Memory state around the buggy address:
[   23.175243]  ffff0000101ea100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.175920]  ffff0000101ea180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.176594] >ffff0000101ea200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   23.177265]                                            ^
[   23.177768]  ffff0000101ea280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.178443]  ffff0000101ea300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.179113] ==================================================================
[   23.088699] ==================================================================
[   23.089794] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   23.090481] Read of size 1 at addr ffff00000ea7eb00 by task kunit_try_catch/281
[   23.091160] 
[   23.091324] CPU: 3 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.091373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.091388] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.091405] Call trace:
[   23.091417]  show_stack+0x20/0x38 (C)
[   23.091450]  dump_stack_lvl+0x8c/0xd0
[   23.091482]  print_report+0x118/0x608
[   23.091512]  kasan_report+0xdc/0x128
[   23.091539]  __asan_report_load1_noabort+0x20/0x30
[   23.091573]  mempool_uaf_helper+0x314/0x340
[   23.091607]  mempool_kmalloc_uaf+0xc4/0x120
[   23.091641]  kunit_try_run_case+0x170/0x3f0
[   23.091677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.091716]  kthread+0x328/0x630
[   23.091750]  ret_from_fork+0x10/0x20
[   23.091783] 
[   23.097734] Allocated by task 281:
[   23.098060]  kasan_save_stack+0x3c/0x68
[   23.098435]  kasan_save_track+0x20/0x40
[   23.098805]  kasan_save_alloc_info+0x40/0x58
[   23.099219]  __kasan_mempool_unpoison_object+0x11c/0x180
[   23.099722]  remove_element+0x130/0x1f8
[   23.100102]  mempool_alloc_preallocated+0x58/0xc0
[   23.100555]  mempool_uaf_helper+0xa4/0x340
[   23.100955]  mempool_kmalloc_uaf+0xc4/0x120
[   23.101363]  kunit_try_run_case+0x170/0x3f0
[   23.101771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.102295]  kthread+0x328/0x630
[   23.102619]  ret_from_fork+0x10/0x20
[   23.102969] 
[   23.103121] Freed by task 281:
[   23.103417]  kasan_save_stack+0x3c/0x68
[   23.103789]  kasan_save_track+0x20/0x40
[   23.104161]  kasan_save_free_info+0x4c/0x78
[   23.104565]  __kasan_mempool_poison_object+0xc0/0x150
[   23.105048]  mempool_free+0x28c/0x328
[   23.105408]  mempool_uaf_helper+0x104/0x340
[   23.105816]  mempool_kmalloc_uaf+0xc4/0x120
[   23.106224]  kunit_try_run_case+0x170/0x3f0
[   23.106630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.107154]  kthread+0x328/0x630
[   23.107477]  ret_from_fork+0x10/0x20
[   23.107827] 
[   23.107980] The buggy address belongs to the object at ffff00000ea7eb00
[   23.107980]  which belongs to the cache kmalloc-128 of size 128
[   23.109115] The buggy address is located 0 bytes inside of
[   23.109115]  freed 128-byte region [ffff00000ea7eb00, ffff00000ea7eb80)
[   23.110214] 
[   23.110368] The buggy address belongs to the physical page:
[   23.110885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea7e
[   23.111611] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.112223] page_type: f5(slab)
[   23.112538] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   23.113254] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.113962] page dumped because: kasan: bad access detected
[   23.114477] 
[   23.114629] Memory state around the buggy address:
[   23.115078]  ffff00000ea7ea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.115745]  ffff00000ea7ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.116411] >ffff00000ea7eb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.117073]                    ^
[   23.117383]  ffff00000ea7eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.118050]  ffff00000ea7ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.118711] ==================================================================