Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   36.822667] ==================================================================
[   36.831986] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   36.838666] Read of size 1 at addr ffff000806390000 by task kunit_try_catch/276
[   36.845956] 
[   36.847443] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   36.847495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.847513] Hardware name: WinLink E850-96 board (DT)
[   36.847538] Call trace:
[   36.847554]  show_stack+0x20/0x38 (C)
[   36.847589]  dump_stack_lvl+0x8c/0xd0
[   36.847627]  print_report+0x118/0x608
[   36.847663]  kasan_report+0xdc/0x128
[   36.847698]  __asan_report_load1_noabort+0x20/0x30
[   36.847737]  mempool_uaf_helper+0x314/0x340
[   36.847771]  mempool_kmalloc_large_uaf+0xc4/0x120
[   36.847806]  kunit_try_run_case+0x170/0x3f0
[   36.847843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.847882]  kthread+0x328/0x630
[   36.847911]  ret_from_fork+0x10/0x20
[   36.847945] 
[   36.914967] The buggy address belongs to the physical page:
[   36.920526] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886390
[   36.928510] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.936147] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.943090] page_type: f8(unknown)
[   36.946489] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.954208] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.961937] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.969745] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.977559] head: 0bfffe0000000002 fffffdffe018e401 00000000ffffffff 00000000ffffffff
[   36.985371] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.993175] page dumped because: kasan: bad access detected
[   36.998731] 
[   37.000207] Memory state around the buggy address:
[   37.004986]  ffff00080638ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.012190]  ffff00080638ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.019396] >ffff000806390000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.026595]                    ^
[   37.029810]  ffff000806390080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.037016]  ffff000806390100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.044216] ==================================================================
[   37.382222] ==================================================================
[   37.385970] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   37.392651] Read of size 1 at addr ffff0008051c0000 by task kunit_try_catch/280
[   37.399941] 
[   37.401429] CPU: 4 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   37.401483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.401502] Hardware name: WinLink E850-96 board (DT)
[   37.401527] Call trace:
[   37.401543]  show_stack+0x20/0x38 (C)
[   37.401579]  dump_stack_lvl+0x8c/0xd0
[   37.401618]  print_report+0x118/0x608
[   37.401656]  kasan_report+0xdc/0x128
[   37.401692]  __asan_report_load1_noabort+0x20/0x30
[   37.401735]  mempool_uaf_helper+0x314/0x340
[   37.401767]  mempool_page_alloc_uaf+0xc0/0x118
[   37.401801]  kunit_try_run_case+0x170/0x3f0
[   37.401841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.401879]  kthread+0x328/0x630
[   37.401911]  ret_from_fork+0x10/0x20
[   37.401949] 
[   37.468693] The buggy address belongs to the physical page:
[   37.474248] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8851c0
[   37.482234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.488757] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.496474] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.504195] page dumped because: kasan: bad access detected
[   37.509748] 
[   37.511223] Memory state around the buggy address:
[   37.516008]  ffff0008051bff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.523206]  ffff0008051bff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.530413] >ffff0008051c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.537612]                    ^
[   37.540828]  ffff0008051c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.548033]  ffff0008051c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.555235] ==================================================================

[   28.454308] ==================================================================
[   28.454476] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   28.454629] Read of size 1 at addr fff00000c786c000 by task kunit_try_catch/229
[   28.454809] 
[   28.454892] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   28.455177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.455257] Hardware name: linux,dummy-virt (DT)
[   28.455432] Call trace:
[   28.455488]  show_stack+0x20/0x38 (C)
[   28.455693]  dump_stack_lvl+0x8c/0xd0
[   28.455829]  print_report+0x118/0x608
[   28.456031]  kasan_report+0xdc/0x128
[   28.456159]  __asan_report_load1_noabort+0x20/0x30
[   28.456299]  mempool_uaf_helper+0x314/0x340
[   28.456559]  mempool_kmalloc_large_uaf+0xc4/0x120
[   28.456728]  kunit_try_run_case+0x170/0x3f0
[   28.456948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.457179]  kthread+0x328/0x630
[   28.457367]  ret_from_fork+0x10/0x20
[   28.457578] 
[   28.457735] The buggy address belongs to the physical page:
[   28.459156] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c
[   28.459392] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.459684] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.460092] page_type: f8(unknown)
[   28.460280] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.460426] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   28.460555] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.461243] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   28.461373] head: 0bfffe0000000002 ffffc1ffc31e1b01 00000000ffffffff 00000000ffffffff
[   28.462148] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.462265] page dumped because: kasan: bad access detected
[   28.462347] 
[   28.462436] Memory state around the buggy address:
[   28.463241]  fff00000c786bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.463554]  fff00000c786bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.463779] >fff00000c786c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.463883]                    ^
[   28.464263]  fff00000c786c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.464388]  fff00000c786c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.464486] ==================================================================
[   28.566952] ==================================================================
[   28.567480] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   28.567655] Read of size 1 at addr fff00000c786c000 by task kunit_try_catch/233
[   28.567768] 
[   28.567861] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   28.568082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.568156] Hardware name: linux,dummy-virt (DT)
[   28.568242] Call trace:
[   28.568304]  show_stack+0x20/0x38 (C)
[   28.568426]  dump_stack_lvl+0x8c/0xd0
[   28.571233]  print_report+0x118/0x608
[   28.571879]  kasan_report+0xdc/0x128
[   28.572032]  __asan_report_load1_noabort+0x20/0x30
[   28.572173]  mempool_uaf_helper+0x314/0x340
[   28.572296]  mempool_page_alloc_uaf+0xc0/0x118
[   28.572431]  kunit_try_run_case+0x170/0x3f0
[   28.572576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.572720]  kthread+0x328/0x630
[   28.572845]  ret_from_fork+0x10/0x20
[   28.572997] 
[   28.573056] The buggy address belongs to the physical page:
[   28.573136] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c
[   28.573275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.573429] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.573553] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.573650] page dumped because: kasan: bad access detected
[   28.573731] 
[   28.573783] Memory state around the buggy address:
[   28.573868]  fff00000c786bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.577046]  fff00000c786bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.579626] >fff00000c786c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.579727]                    ^
[   28.579807]  fff00000c786c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.580297]  fff00000c786c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.580520] ==================================================================

[   28.535336] ==================================================================
[   28.535480] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   28.535605] Read of size 1 at addr fff00000c7728000 by task kunit_try_catch/229
[   28.535722] 
[   28.535812] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   28.536034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.536104] Hardware name: linux,dummy-virt (DT)
[   28.536746] Call trace:
[   28.536984]  show_stack+0x20/0x38 (C)
[   28.537161]  dump_stack_lvl+0x8c/0xd0
[   28.537305]  print_report+0x118/0x608
[   28.537438]  kasan_report+0xdc/0x128
[   28.538112]  __asan_report_load1_noabort+0x20/0x30
[   28.538255]  mempool_uaf_helper+0x314/0x340
[   28.538765]  mempool_kmalloc_large_uaf+0xc4/0x120
[   28.538992]  kunit_try_run_case+0x170/0x3f0
[   28.539502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.540011]  kthread+0x328/0x630
[   28.540152]  ret_from_fork+0x10/0x20
[   28.540737] 
[   28.540799] The buggy address belongs to the physical page:
[   28.541000] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107728
[   28.541469] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.541593] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.541736] page_type: f8(unknown)
[   28.541866] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.541994] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   28.542548] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.542685] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   28.542833] head: 0bfffe0000000002 ffffc1ffc31dca01 00000000ffffffff 00000000ffffffff
[   28.543118] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.543265] page dumped because: kasan: bad access detected
[   28.543676] 
[   28.543862] Memory state around the buggy address:
[   28.543944]  fff00000c7727f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.544057]  fff00000c7727f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.544169] >fff00000c7728000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.544275]                    ^
[   28.544371]  fff00000c7728080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.544574]  fff00000c7728100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.544777] ==================================================================
[   28.639109] ==================================================================
[   28.639304] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   28.639463] Read of size 1 at addr fff00000c7728000 by task kunit_try_catch/233
[   28.639599] 
[   28.639819] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   28.640067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.640207] Hardware name: linux,dummy-virt (DT)
[   28.640297] Call trace:
[   28.640361]  show_stack+0x20/0x38 (C)
[   28.640511]  dump_stack_lvl+0x8c/0xd0
[   28.640766]  print_report+0x118/0x608
[   28.641073]  kasan_report+0xdc/0x128
[   28.641411]  __asan_report_load1_noabort+0x20/0x30
[   28.641568]  mempool_uaf_helper+0x314/0x340
[   28.641699]  mempool_page_alloc_uaf+0xc0/0x118
[   28.641832]  kunit_try_run_case+0x170/0x3f0
[   28.641997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.642220]  kthread+0x328/0x630
[   28.642360]  ret_from_fork+0x10/0x20
[   28.642601] 
[   28.642666] The buggy address belongs to the physical page:
[   28.642746] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107728
[   28.642907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.643063] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.643213] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.643390] page dumped because: kasan: bad access detected
[   28.643482] 
[   28.643539] Memory state around the buggy address:
[   28.643697]  fff00000c7727f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.643829]  fff00000c7727f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.643979] >fff00000c7728000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.644244]                    ^
[   28.644323]  fff00000c7728080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.644436]  fff00000c7728100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.644550] ==================================================================

[   21.346357] ==================================================================
[   21.347448] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   21.348339] Read of size 1 at addr ffff888103ab4000 by task kunit_try_catch/247
[   21.348902] 
[   21.349157] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.349287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.349327] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.349394] Call Trace:
[   21.349441]  <TASK>
[   21.349516]  dump_stack_lvl+0x73/0xb0
[   21.349637]  print_report+0xd1/0x650
[   21.349716]  ? __virt_addr_valid+0x1db/0x2d0
[   21.349796]  ? mempool_uaf_helper+0x392/0x400
[   21.349870]  ? kasan_addr_to_slab+0x11/0xa0
[   21.349940]  ? mempool_uaf_helper+0x392/0x400
[   21.350013]  kasan_report+0x141/0x180
[   21.350146]  ? mempool_uaf_helper+0x392/0x400
[   21.350239]  __asan_report_load1_noabort+0x18/0x20
[   21.350323]  mempool_uaf_helper+0x392/0x400
[   21.350401]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   21.350468]  ? update_load_avg+0x1be/0x21b0
[   21.350574]  ? dequeue_entities+0x27e/0x1740
[   21.350650]  ? finish_task_switch.isra.0+0x153/0x700
[   21.350719]  mempool_kmalloc_large_uaf+0xef/0x140
[   21.350782]  ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10
[   21.350850]  ? __pfx_mempool_kmalloc+0x10/0x10
[   21.350915]  ? __pfx_mempool_kfree+0x10/0x10
[   21.350979]  ? __pfx_read_tsc+0x10/0x10
[   21.351036]  ? ktime_get_ts64+0x86/0x230
[   21.351098]  kunit_try_run_case+0x1a5/0x480
[   21.351170]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.351237]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.351306]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.351341]  ? __kthread_parkme+0x82/0x180
[   21.351372]  ? preempt_count_sub+0x50/0x80
[   21.351403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.351439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.351474]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.351541]  kthread+0x337/0x6f0
[   21.351644]  ? trace_preempt_on+0x20/0xc0
[   21.351698]  ? __pfx_kthread+0x10/0x10
[   21.351729]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.351759]  ? calculate_sigpending+0x7b/0xa0
[   21.351794]  ? __pfx_kthread+0x10/0x10
[   21.351824]  ret_from_fork+0x116/0x1d0
[   21.351850]  ? __pfx_kthread+0x10/0x10
[   21.351879]  ret_from_fork_asm+0x1a/0x30
[   21.351922]  </TASK>
[   21.351937] 
[   21.378596] The buggy address belongs to the physical page:
[   21.379162] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ab4
[   21.380800] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.381690] flags: 0x200000000000040(head|node=0|zone=2)
[   21.382236] page_type: f8(unknown)
[   21.382731] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.383338] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.384630] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.385536] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.386178] head: 0200000000000002 ffffea00040ead01 00000000ffffffff 00000000ffffffff
[   21.387398] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.388636] page dumped because: kasan: bad access detected
[   21.389324] 
[   21.389556] Memory state around the buggy address:
[   21.390142]  ffff888103ab3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.391183]  ffff888103ab3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.391608] >ffff888103ab4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.392396]                    ^
[   21.392821]  ffff888103ab4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.393658]  ffff888103ab4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.394310] ==================================================================
[   21.477296] ==================================================================
[   21.478394] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   21.480182] Read of size 1 at addr ffff888103a04000 by task kunit_try_catch/251
[   21.481288] 
[   21.481550] CPU: 1 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.481699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.481741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.481889] Call Trace:
[   21.482024]  <TASK>
[   21.482240]  dump_stack_lvl+0x73/0xb0
[   21.482365]  print_report+0xd1/0x650
[   21.482445]  ? __virt_addr_valid+0x1db/0x2d0
[   21.482544]  ? mempool_uaf_helper+0x392/0x400
[   21.482622]  ? kasan_addr_to_slab+0x11/0xa0
[   21.482687]  ? mempool_uaf_helper+0x392/0x400
[   21.482761]  kasan_report+0x141/0x180
[   21.482837]  ? mempool_uaf_helper+0x392/0x400
[   21.483001]  __asan_report_load1_noabort+0x18/0x20
[   21.483039]  mempool_uaf_helper+0x392/0x400
[   21.483074]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   21.483106]  ? update_load_avg+0x1be/0x21b0
[   21.483142]  ? update_load_avg+0x1be/0x21b0
[   21.483174]  ? update_curr+0x80/0x810
[   21.483202]  ? __kasan_check_write+0x18/0x20
[   21.483235]  ? irqentry_exit+0x2a/0x60
[   21.483305]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   21.483345]  mempool_page_alloc_uaf+0xed/0x140
[   21.483380]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   21.483418]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   21.483447]  ? __pfx_mempool_free_pages+0x10/0x10
[   21.483476]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   21.483547]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   21.483630]  kunit_try_run_case+0x1a5/0x480
[   21.483693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.483729]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.483765]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.483799]  ? __kthread_parkme+0x82/0x180
[   21.483829]  ? preempt_count_sub+0x50/0x80
[   21.483862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.483897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.483931]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.483964]  kthread+0x337/0x6f0
[   21.483992]  ? trace_preempt_on+0x20/0xc0
[   21.484026]  ? __pfx_kthread+0x10/0x10
[   21.484054]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.484083]  ? calculate_sigpending+0x7b/0xa0
[   21.484119]  ? __pfx_kthread+0x10/0x10
[   21.484149]  ret_from_fork+0x116/0x1d0
[   21.484176]  ? __pfx_kthread+0x10/0x10
[   21.484204]  ret_from_fork_asm+0x1a/0x30
[   21.484281]  </TASK>
[   21.484301] 
[   21.511404] The buggy address belongs to the physical page:
[   21.512194] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a04
[   21.513099] flags: 0x200000000000000(node=0|zone=2)
[   21.513792] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   21.514752] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.515851] page dumped because: kasan: bad access detected
[   21.516485] 
[   21.516937] Memory state around the buggy address:
[   21.517492]  ffff888103a03f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.518417]  ffff888103a03f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.519399] >ffff888103a04000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.520276]                    ^
[   21.521030]  ffff888103a04080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.521785]  ffff888103a04100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.522331] ==================================================================

[   20.290341] ==================================================================
[   20.291762] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   20.292828] Read of size 1 at addr ffff888103990000 by task kunit_try_catch/251
[   20.293506] 
[   20.293797] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   20.293941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.293981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.294044] Call Trace:
[   20.294084]  <TASK>
[   20.294127]  dump_stack_lvl+0x73/0xb0
[   20.294514]  print_report+0xd1/0x650
[   20.294696]  ? __virt_addr_valid+0x1db/0x2d0
[   20.294780]  ? mempool_uaf_helper+0x392/0x400
[   20.294854]  ? kasan_addr_to_slab+0x11/0xa0
[   20.294944]  ? mempool_uaf_helper+0x392/0x400
[   20.294988]  kasan_report+0x141/0x180
[   20.295022]  ? mempool_uaf_helper+0x392/0x400
[   20.295060]  __asan_report_load1_noabort+0x18/0x20
[   20.295101]  mempool_uaf_helper+0x392/0x400
[   20.295177]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   20.295212]  ? update_load_avg+0x1be/0x21b0
[   20.295248]  ? dequeue_entities+0x27e/0x1740
[   20.295283]  ? finish_task_switch.isra.0+0x153/0x700
[   20.295319]  mempool_page_alloc_uaf+0xed/0x140
[   20.295353]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   20.295391]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   20.295421]  ? __pfx_mempool_free_pages+0x10/0x10
[   20.295450]  ? __pfx_read_tsc+0x10/0x10
[   20.295480]  ? ktime_get_ts64+0x86/0x230
[   20.295515]  kunit_try_run_case+0x1a5/0x480
[   20.295644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.295685]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.295721]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.295755]  ? __kthread_parkme+0x82/0x180
[   20.295783]  ? preempt_count_sub+0x50/0x80
[   20.295815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.295850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.295908]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.295949]  kthread+0x337/0x6f0
[   20.295978]  ? trace_preempt_on+0x20/0xc0
[   20.296010]  ? __pfx_kthread+0x10/0x10
[   20.296040]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.296070]  ? calculate_sigpending+0x7b/0xa0
[   20.296128]  ? __pfx_kthread+0x10/0x10
[   20.296176]  ret_from_fork+0x116/0x1d0
[   20.296203]  ? __pfx_kthread+0x10/0x10
[   20.296233]  ret_from_fork_asm+0x1a/0x30
[   20.296274]  </TASK>
[   20.296288] 
[   20.317729] The buggy address belongs to the physical page:
[   20.318206] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103990
[   20.318997] flags: 0x200000000000000(node=0|zone=2)
[   20.320929] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   20.321632] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.322775] page dumped because: kasan: bad access detected
[   20.323343] 
[   20.323524] Memory state around the buggy address:
[   20.324112]  ffff88810398ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.324715]  ffff88810398ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.325327] >ffff888103990000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.325919]                    ^
[   20.326217]  ffff888103990080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.326812]  ffff888103990100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.328001] ==================================================================
[   20.172808] ==================================================================
[   20.173713] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   20.174643] Read of size 1 at addr ffff888102a48000 by task kunit_try_catch/247
[   20.175320] 
[   20.175635] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   20.175763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.175806] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.175869] Call Trace:
[   20.175984]  <TASK>
[   20.176062]  dump_stack_lvl+0x73/0xb0
[   20.176158]  print_report+0xd1/0x650
[   20.176239]  ? __virt_addr_valid+0x1db/0x2d0
[   20.176379]  ? mempool_uaf_helper+0x392/0x400
[   20.176483]  ? kasan_addr_to_slab+0x11/0xa0
[   20.176713]  ? mempool_uaf_helper+0x392/0x400
[   20.176797]  kasan_report+0x141/0x180
[   20.176893]  ? mempool_uaf_helper+0x392/0x400
[   20.176985]  __asan_report_load1_noabort+0x18/0x20
[   20.177037]  mempool_uaf_helper+0x392/0x400
[   20.177074]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   20.177122]  ? __kasan_check_write+0x18/0x20
[   20.177172]  ? __pfx_sched_clock_cpu+0x10/0x10
[   20.177209]  ? finish_task_switch.isra.0+0x153/0x700
[   20.177247]  mempool_kmalloc_large_uaf+0xef/0x140
[   20.177282]  ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10
[   20.177319]  ? __pfx_mempool_kmalloc+0x10/0x10
[   20.177355]  ? __pfx_mempool_kfree+0x10/0x10
[   20.177390]  ? __pfx_read_tsc+0x10/0x10
[   20.177420]  ? ktime_get_ts64+0x86/0x230
[   20.177454]  kunit_try_run_case+0x1a5/0x480
[   20.177491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.177589]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.177684]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.177731]  ? __kthread_parkme+0x82/0x180
[   20.177798]  ? preempt_count_sub+0x50/0x80
[   20.177835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.177873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.177938]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.177974]  kthread+0x337/0x6f0
[   20.178004]  ? trace_preempt_on+0x20/0xc0
[   20.178039]  ? __pfx_kthread+0x10/0x10
[   20.178067]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.178111]  ? calculate_sigpending+0x7b/0xa0
[   20.178180]  ? __pfx_kthread+0x10/0x10
[   20.178213]  ret_from_fork+0x116/0x1d0
[   20.178240]  ? __pfx_kthread+0x10/0x10
[   20.178280]  ret_from_fork_asm+0x1a/0x30
[   20.178323]  </TASK>
[   20.178337] 
[   20.203387] The buggy address belongs to the physical page:
[   20.203973] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a48
[   20.204890] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.205700] flags: 0x200000000000040(head|node=0|zone=2)
[   20.206192] page_type: f8(unknown)
[   20.207195] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.208126] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.208905] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.209787] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.210895] head: 0200000000000002 ffffea00040a9201 00000000ffffffff 00000000ffffffff
[   20.211706] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.212298] page dumped because: kasan: bad access detected
[   20.212761] 
[   20.212994] Memory state around the buggy address:
[   20.214066]  ffff888102a47f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.214947]  ffff888102a47f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.215683] >ffff888102a48000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.216486]                    ^
[   20.216840]  ffff888102a48080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.217642]  ffff888102a48100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.218207] ==================================================================

[   22.174667] ==================================================================
[   22.175733] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   22.176374] Read of size 1 at addr ffff00000e270000 by task kunit_try_catch/282
[   22.177051] 
[   22.177217] CPU: 3 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.177266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.177280] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.177298] Call trace:
[   22.177310]  show_stack+0x20/0x38 (C)
[   22.177343]  dump_stack_lvl+0x8c/0xd0
[   22.177379]  print_report+0x118/0x608
[   22.177413]  kasan_report+0xdc/0x128
[   22.177445]  __asan_report_load1_noabort+0x20/0x30
[   22.177482]  mempool_uaf_helper+0x314/0x340
[   22.177512]  mempool_kmalloc_large_uaf+0xc4/0x120
[   22.177544]  kunit_try_run_case+0x170/0x3f0
[   22.177578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.177616]  kthread+0x328/0x630
[   22.177644]  ret_from_fork+0x10/0x20
[   22.177675] 
[   22.183674] The buggy address belongs to the physical page:
[   22.184190] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe270
[   22.184913] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.185619] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   22.186270] page_type: f8(unknown)
[   22.186606] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.187320] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.188035] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.188758] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.189481] head: 03fffe0000000002 fffffdffc0389c01 00000000ffffffff 00000000ffffffff
[   22.190204] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.190919] page dumped because: kasan: bad access detected
[   22.191433] 
[   22.191586] Memory state around the buggy address:
[   22.192034]  ffff00000e26ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.192700]  ffff00000e26ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.193366] >ffff00000e270000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.194027]                    ^
[   22.194338]  ffff00000e270080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.195004]  ffff00000e270100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.195665] ==================================================================
[   22.260274] ==================================================================
[   22.261333] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   22.261976] Read of size 1 at addr ffff00000e1f8000 by task kunit_try_catch/286
[   22.262651] 
[   22.262816] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.262867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.262882] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.262899] Call trace:
[   22.262910]  show_stack+0x20/0x38 (C)
[   22.262943]  dump_stack_lvl+0x8c/0xd0
[   22.262979]  print_report+0x118/0x608
[   22.263013]  kasan_report+0xdc/0x128
[   22.263045]  __asan_report_load1_noabort+0x20/0x30
[   22.263082]  mempool_uaf_helper+0x314/0x340
[   22.263112]  mempool_page_alloc_uaf+0xc0/0x118
[   22.263145]  kunit_try_run_case+0x170/0x3f0
[   22.263179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.263217]  kthread+0x328/0x630
[   22.263243]  ret_from_fork+0x10/0x20
[   22.263275] 
[   22.269249] The buggy address belongs to the physical page:
[   22.269764] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe1f8
[   22.270489] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.271111] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   22.271827] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.272534] page dumped because: kasan: bad access detected
[   22.273049] 
[   22.273201] Memory state around the buggy address:
[   22.273650]  ffff00000e1f7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.274316]  ffff00000e1f7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.274981] >ffff00000e1f8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.275642]                    ^
[   22.275952]  ffff00000e1f8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.276618]  ffff00000e1f8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.277279] ==================================================================