Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
x86

[   19.028739] ==================================================================
[   19.029064] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   19.029557] Read of size 1 at addr fff00000c69b6600 by task kunit_try_catch/228
[   19.029642] 
[   19.029951] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.030058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.030085] Hardware name: linux,dummy-virt (DT)
[   19.030153] Call trace:
[   19.030179]  show_stack+0x20/0x38 (C)
[   19.030233]  dump_stack_lvl+0x8c/0xd0
[   19.030283]  print_report+0x118/0x608
[   19.030809]  kasan_report+0xdc/0x128
[   19.030887]  __asan_report_load1_noabort+0x20/0x30
[   19.030947]  mempool_uaf_helper+0x314/0x340
[   19.031004]  mempool_kmalloc_uaf+0xc4/0x120
[   19.031392]  kunit_try_run_case+0x170/0x3f0
[   19.031540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.031692]  kthread+0x328/0x630
[   19.031755]  ret_from_fork+0x10/0x20
[   19.032145] 
[   19.032205] Allocated by task 228:
[   19.032242]  kasan_save_stack+0x3c/0x68
[   19.032556]  kasan_save_track+0x20/0x40
[   19.032668]  kasan_save_alloc_info+0x40/0x58
[   19.032711]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.032994]  remove_element+0x130/0x1f8
[   19.033132]  mempool_alloc_preallocated+0x58/0xc0
[   19.033465]  mempool_uaf_helper+0xa4/0x340
[   19.033645]  mempool_kmalloc_uaf+0xc4/0x120
[   19.033737]  kunit_try_run_case+0x170/0x3f0
[   19.033877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.034350]  kthread+0x328/0x630
[   19.034432]  ret_from_fork+0x10/0x20
[   19.034555] 
[   19.034574] Freed by task 228:
[   19.034855]  kasan_save_stack+0x3c/0x68
[   19.035018]  kasan_save_track+0x20/0x40
[   19.035119]  kasan_save_free_info+0x4c/0x78
[   19.035250]  __kasan_mempool_poison_object+0xc0/0x150
[   19.035480]  mempool_free+0x28c/0x328
[   19.035542]  mempool_uaf_helper+0x104/0x340
[   19.035580]  mempool_kmalloc_uaf+0xc4/0x120
[   19.035617]  kunit_try_run_case+0x170/0x3f0
[   19.035664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.035709]  kthread+0x328/0x630
[   19.035760]  ret_from_fork+0x10/0x20
[   19.035797] 
[   19.035819] The buggy address belongs to the object at fff00000c69b6600
[   19.035819]  which belongs to the cache kmalloc-128 of size 128
[   19.036485] The buggy address is located 0 bytes inside of
[   19.036485]  freed 128-byte region [fff00000c69b6600, fff00000c69b6680)
[   19.036569] 
[   19.036678] The buggy address belongs to the physical page:
[   19.036756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069b6
[   19.037157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.037239] page_type: f5(slab)
[   19.037301] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.037419] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.037538] page dumped because: kasan: bad access detected
[   19.037606] 
[   19.037728] Memory state around the buggy address:
[   19.037793]  fff00000c69b6500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.037859]  fff00000c69b6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.038224] >fff00000c69b6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.038286]                    ^
[   19.038395]  fff00000c69b6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.038488]  fff00000c69b6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.038648] ==================================================================
[   19.068732] ==================================================================
[   19.068812] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   19.068872] Read of size 1 at addr fff00000c65c5240 by task kunit_try_catch/232
[   19.068920] 
[   19.068965] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.069063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.069088] Hardware name: linux,dummy-virt (DT)
[   19.069443] Call trace:
[   19.069654]  show_stack+0x20/0x38 (C)
[   19.069718]  dump_stack_lvl+0x8c/0xd0
[   19.069766]  print_report+0x118/0x608
[   19.069812]  kasan_report+0xdc/0x128
[   19.069856]  __asan_report_load1_noabort+0x20/0x30
[   19.070502]  mempool_uaf_helper+0x314/0x340
[   19.070901]  mempool_slab_uaf+0xc0/0x118
[   19.070961]  kunit_try_run_case+0x170/0x3f0
[   19.071031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.071419]  kthread+0x328/0x630
[   19.071537]  ret_from_fork+0x10/0x20
[   19.071591] 
[   19.071612] Allocated by task 232:
[   19.071669]  kasan_save_stack+0x3c/0x68
[   19.072026]  kasan_save_track+0x20/0x40
[   19.072103]  kasan_save_alloc_info+0x40/0x58
[   19.072155]  __kasan_mempool_unpoison_object+0xbc/0x180
[   19.072441]  remove_element+0x16c/0x1f8
[   19.072620]  mempool_alloc_preallocated+0x58/0xc0
[   19.072716]  mempool_uaf_helper+0xa4/0x340
[   19.072760]  mempool_slab_uaf+0xc0/0x118
[   19.073017]  kunit_try_run_case+0x170/0x3f0
[   19.073151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.073351]  kthread+0x328/0x630
[   19.073419]  ret_from_fork+0x10/0x20
[   19.073476] 
[   19.073496] Freed by task 232:
[   19.073808]  kasan_save_stack+0x3c/0x68
[   19.073924]  kasan_save_track+0x20/0x40
[   19.073964]  kasan_save_free_info+0x4c/0x78
[   19.074229]  __kasan_mempool_poison_object+0xc0/0x150
[   19.074365]  mempool_free+0x28c/0x328
[   19.074422]  mempool_uaf_helper+0x104/0x340
[   19.074734]  mempool_slab_uaf+0xc0/0x118
[   19.074827]  kunit_try_run_case+0x170/0x3f0
[   19.074894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.075220]  kthread+0x328/0x630
[   19.075370]  ret_from_fork+0x10/0x20
[   19.075455] 
[   19.075587] The buggy address belongs to the object at fff00000c65c5240
[   19.075587]  which belongs to the cache test_cache of size 123
[   19.075711] The buggy address is located 0 bytes inside of
[   19.075711]  freed 123-byte region [fff00000c65c5240, fff00000c65c52bb)
[   19.076203] 
[   19.076255] The buggy address belongs to the physical page:
[   19.076320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.076481] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.076537] page_type: f5(slab)
[   19.076913] raw: 0bfffe0000000000 fff00000c1aa5c80 dead000000000122 0000000000000000
[   19.077108] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   19.077340] page dumped because: kasan: bad access detected
[   19.077510] 
[   19.077601] Memory state around the buggy address:
[   19.077696]  fff00000c65c5100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.077784]  fff00000c65c5180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.077966] >fff00000c65c5200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   19.078027]                                            ^
[   19.078327]  fff00000c65c5280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.078394]  fff00000c65c5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.078647] ==================================================================

[   18.702513] ==================================================================
[   18.702578] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   18.702632] Read of size 1 at addr fff00000c6230240 by task kunit_try_catch/232
[   18.702683] 
[   18.702755] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.702838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.702880] Hardware name: linux,dummy-virt (DT)
[   18.702925] Call trace:
[   18.703076]  show_stack+0x20/0x38 (C)
[   18.703129]  dump_stack_lvl+0x8c/0xd0
[   18.703176]  print_report+0x118/0x608
[   18.703219]  kasan_report+0xdc/0x128
[   18.703284]  __asan_report_load1_noabort+0x20/0x30
[   18.703339]  mempool_uaf_helper+0x314/0x340
[   18.703385]  mempool_slab_uaf+0xc0/0x118
[   18.703428]  kunit_try_run_case+0x170/0x3f0
[   18.703475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.703526]  kthread+0x328/0x630
[   18.703565]  ret_from_fork+0x10/0x20
[   18.703612] 
[   18.703630] Allocated by task 232:
[   18.703657]  kasan_save_stack+0x3c/0x68
[   18.703715]  kasan_save_track+0x20/0x40
[   18.703795]  kasan_save_alloc_info+0x40/0x58
[   18.703865]  __kasan_mempool_unpoison_object+0xbc/0x180
[   18.703941]  remove_element+0x16c/0x1f8
[   18.704005]  mempool_alloc_preallocated+0x58/0xc0
[   18.704046]  mempool_uaf_helper+0xa4/0x340
[   18.704111]  mempool_slab_uaf+0xc0/0x118
[   18.704196]  kunit_try_run_case+0x170/0x3f0
[   18.704296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.704355]  kthread+0x328/0x630
[   18.704391]  ret_from_fork+0x10/0x20
[   18.704426] 
[   18.704446] Freed by task 232:
[   18.704474]  kasan_save_stack+0x3c/0x68
[   18.704510]  kasan_save_track+0x20/0x40
[   18.704547]  kasan_save_free_info+0x4c/0x78
[   18.704588]  __kasan_mempool_poison_object+0xc0/0x150
[   18.704632]  mempool_free+0x28c/0x328
[   18.704666]  mempool_uaf_helper+0x104/0x340
[   18.704713]  mempool_slab_uaf+0xc0/0x118
[   18.704750]  kunit_try_run_case+0x170/0x3f0
[   18.704830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.704880]  kthread+0x328/0x630
[   18.704924]  ret_from_fork+0x10/0x20
[   18.704958] 
[   18.704979] The buggy address belongs to the object at fff00000c6230240
[   18.704979]  which belongs to the cache test_cache of size 123
[   18.705046] The buggy address is located 0 bytes inside of
[   18.705046]  freed 123-byte region [fff00000c6230240, fff00000c62302bb)
[   18.705114] 
[   18.705135] The buggy address belongs to the physical page:
[   18.705165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106230
[   18.705216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.705264] page_type: f5(slab)
[   18.705314] raw: 0bfffe0000000000 fff00000c77d9a00 dead000000000122 0000000000000000
[   18.705363] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   18.705402] page dumped because: kasan: bad access detected
[   18.705433] 
[   18.705450] Memory state around the buggy address:
[   18.705482]  fff00000c6230100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.705523]  fff00000c6230180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.705564] >fff00000c6230200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   18.705608]                                            ^
[   18.705642]  fff00000c6230280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.705683]  fff00000c6230300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.705718] ==================================================================
[   18.650521] ==================================================================
[   18.650586] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   18.651284] Read of size 1 at addr fff00000c7729600 by task kunit_try_catch/228
[   18.651350] 
[   18.651940] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.652181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.652942] Hardware name: linux,dummy-virt (DT)
[   18.653212] Call trace:
[   18.653239]  show_stack+0x20/0x38 (C)
[   18.653596]  dump_stack_lvl+0x8c/0xd0
[   18.653774]  print_report+0x118/0x608
[   18.654068]  kasan_report+0xdc/0x128
[   18.654387]  __asan_report_load1_noabort+0x20/0x30
[   18.654460]  mempool_uaf_helper+0x314/0x340
[   18.654543]  mempool_kmalloc_uaf+0xc4/0x120
[   18.654591]  kunit_try_run_case+0x170/0x3f0
[   18.654934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.655391]  kthread+0x328/0x630
[   18.655477]  ret_from_fork+0x10/0x20
[   18.655715] 
[   18.655751] Allocated by task 228:
[   18.656147]  kasan_save_stack+0x3c/0x68
[   18.656319]  kasan_save_track+0x20/0x40
[   18.656419]  kasan_save_alloc_info+0x40/0x58
[   18.656748]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.656800]  remove_element+0x130/0x1f8
[   18.656845]  mempool_alloc_preallocated+0x58/0xc0
[   18.657275]  mempool_uaf_helper+0xa4/0x340
[   18.657322]  mempool_kmalloc_uaf+0xc4/0x120
[   18.657360]  kunit_try_run_case+0x170/0x3f0
[   18.657810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.658168]  kthread+0x328/0x630
[   18.658232]  ret_from_fork+0x10/0x20
[   18.658268] 
[   18.658526] Freed by task 228:
[   18.658559]  kasan_save_stack+0x3c/0x68
[   18.658600]  kasan_save_track+0x20/0x40
[   18.658754]  kasan_save_free_info+0x4c/0x78
[   18.658796]  __kasan_mempool_poison_object+0xc0/0x150
[   18.658839]  mempool_free+0x28c/0x328
[   18.659141]  mempool_uaf_helper+0x104/0x340
[   18.659309]  mempool_kmalloc_uaf+0xc4/0x120
[   18.659359]  kunit_try_run_case+0x170/0x3f0
[   18.659642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.659701]  kthread+0x328/0x630
[   18.659734]  ret_from_fork+0x10/0x20
[   18.659770] 
[   18.659790] The buggy address belongs to the object at fff00000c7729600
[   18.659790]  which belongs to the cache kmalloc-128 of size 128
[   18.659850] The buggy address is located 0 bytes inside of
[   18.659850]  freed 128-byte region [fff00000c7729600, fff00000c7729680)
[   18.660844] 
[   18.660892] The buggy address belongs to the physical page:
[   18.660933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107729
[   18.660990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.661040] page_type: f5(slab)
[   18.661084] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.661133] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.661172] page dumped because: kasan: bad access detected
[   18.661815] 
[   18.662217] Memory state around the buggy address:
[   18.662260]  fff00000c7729500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.662331]  fff00000c7729580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.662373] >fff00000c7729600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.662411]                    ^
[   18.662445]  fff00000c7729680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.662666]  fff00000c7729700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.662715] ==================================================================

[   15.014255] ==================================================================
[   15.014838] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   15.015148] Read of size 1 at addr ffff888102aa0e00 by task kunit_try_catch/245
[   15.015542] 
[   15.015712] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.015796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.015819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.015859] Call Trace:
[   15.015886]  <TASK>
[   15.015916]  dump_stack_lvl+0x73/0xb0
[   15.015977]  print_report+0xd1/0x650
[   15.016021]  ? __virt_addr_valid+0x1db/0x2d0
[   15.016061]  ? mempool_uaf_helper+0x392/0x400
[   15.016092]  ? kasan_complete_mode_report_info+0x64/0x200
[   15.016136]  ? mempool_uaf_helper+0x392/0x400
[   15.016178]  kasan_report+0x141/0x180
[   15.016213]  ? mempool_uaf_helper+0x392/0x400
[   15.016258]  __asan_report_load1_noabort+0x18/0x20
[   15.016301]  mempool_uaf_helper+0x392/0x400
[   15.016344]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   15.016389]  ? __kasan_check_write+0x18/0x20
[   15.016428]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.016471]  ? finish_task_switch.isra.0+0x153/0x700
[   15.016511]  mempool_kmalloc_uaf+0xef/0x140
[   15.016582]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   15.016647]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.016678]  ? __pfx_mempool_kfree+0x10/0x10
[   15.016701]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   15.016726]  ? __pfx_read_tsc+0x10/0x10
[   15.016746]  ? ktime_get_ts64+0x86/0x230
[   15.016765]  ? trace_hardirqs_on+0x37/0xe0
[   15.016789]  kunit_try_run_case+0x1a5/0x480
[   15.016813]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.016833]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.016857]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.016878]  ? __kthread_parkme+0x82/0x180
[   15.016896]  ? preempt_count_sub+0x50/0x80
[   15.016918]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.016940]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.016959]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.016980]  kthread+0x337/0x6f0
[   15.016998]  ? trace_preempt_on+0x20/0xc0
[   15.017018]  ? __pfx_kthread+0x10/0x10
[   15.017036]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.017055]  ? calculate_sigpending+0x7b/0xa0
[   15.017078]  ? __pfx_kthread+0x10/0x10
[   15.017097]  ret_from_fork+0x116/0x1d0
[   15.017125]  ? __pfx_kthread+0x10/0x10
[   15.017147]  ret_from_fork_asm+0x1a/0x30
[   15.017177]  </TASK>
[   15.017189] 
[   15.029427] Allocated by task 245:
[   15.029848]  kasan_save_stack+0x45/0x70
[   15.030203]  kasan_save_track+0x18/0x40
[   15.030453]  kasan_save_alloc_info+0x3b/0x50
[   15.030908]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   15.031284]  remove_element+0x11e/0x190
[   15.031732]  mempool_alloc_preallocated+0x4d/0x90
[   15.031937]  mempool_uaf_helper+0x96/0x400
[   15.032169]  mempool_kmalloc_uaf+0xef/0x140
[   15.032463]  kunit_try_run_case+0x1a5/0x480
[   15.032804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.033426]  kthread+0x337/0x6f0
[   15.033852]  ret_from_fork+0x116/0x1d0
[   15.034211]  ret_from_fork_asm+0x1a/0x30
[   15.034444] 
[   15.034649] Freed by task 245:
[   15.035004]  kasan_save_stack+0x45/0x70
[   15.035335]  kasan_save_track+0x18/0x40
[   15.035642]  kasan_save_free_info+0x3f/0x60
[   15.036165]  __kasan_mempool_poison_object+0x131/0x1d0
[   15.037213]  mempool_free+0x2ec/0x380
[   15.038025]  mempool_uaf_helper+0x11a/0x400
[   15.038602]  mempool_kmalloc_uaf+0xef/0x140
[   15.038854]  kunit_try_run_case+0x1a5/0x480
[   15.039005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.039878]  kthread+0x337/0x6f0
[   15.040255]  ret_from_fork+0x116/0x1d0
[   15.040686]  ret_from_fork_asm+0x1a/0x30
[   15.041002] 
[   15.041125] The buggy address belongs to the object at ffff888102aa0e00
[   15.041125]  which belongs to the cache kmalloc-128 of size 128
[   15.041715] The buggy address is located 0 bytes inside of
[   15.041715]  freed 128-byte region [ffff888102aa0e00, ffff888102aa0e80)
[   15.042244] 
[   15.042981] The buggy address belongs to the physical page:
[   15.043606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aa0
[   15.043958] flags: 0x200000000000000(node=0|zone=2)
[   15.044514] page_type: f5(slab)
[   15.045193] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.045365] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.045492] page dumped because: kasan: bad access detected
[   15.045666] 
[   15.046299] Memory state around the buggy address:
[   15.046497]  ffff888102aa0d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.047185]  ffff888102aa0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.047731] >ffff888102aa0e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.047959]                    ^
[   15.048325]  ffff888102aa0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.048971]  ffff888102aa0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.049667] ==================================================================
[   15.084115] ==================================================================
[   15.084543] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   15.085232] Read of size 1 at addr ffff888102abb240 by task kunit_try_catch/249
[   15.085952] 
[   15.086116] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.086206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.086231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.086270] Call Trace:
[   15.086297]  <TASK>
[   15.086348]  dump_stack_lvl+0x73/0xb0
[   15.086660]  print_report+0xd1/0x650
[   15.086698]  ? __virt_addr_valid+0x1db/0x2d0
[   15.086723]  ? mempool_uaf_helper+0x392/0x400
[   15.086745]  ? kasan_complete_mode_report_info+0x64/0x200
[   15.086769]  ? mempool_uaf_helper+0x392/0x400
[   15.086789]  kasan_report+0x141/0x180
[   15.086808]  ? mempool_uaf_helper+0x392/0x400
[   15.086832]  __asan_report_load1_noabort+0x18/0x20
[   15.086854]  mempool_uaf_helper+0x392/0x400
[   15.086875]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   15.086898]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.086920]  ? finish_task_switch.isra.0+0x153/0x700
[   15.086943]  mempool_slab_uaf+0xea/0x140
[   15.086964]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   15.086987]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   15.087011]  ? __pfx_mempool_free_slab+0x10/0x10
[   15.087034]  ? __pfx_read_tsc+0x10/0x10
[   15.087054]  ? ktime_get_ts64+0x86/0x230
[   15.087076]  kunit_try_run_case+0x1a5/0x480
[   15.087111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.087139]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.087162]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.087183]  ? __kthread_parkme+0x82/0x180
[   15.087203]  ? preempt_count_sub+0x50/0x80
[   15.087224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.087246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.087267]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.087288]  kthread+0x337/0x6f0
[   15.087307]  ? trace_preempt_on+0x20/0xc0
[   15.087329]  ? __pfx_kthread+0x10/0x10
[   15.087348]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.087367]  ? calculate_sigpending+0x7b/0xa0
[   15.087390]  ? __pfx_kthread+0x10/0x10
[   15.087409]  ret_from_fork+0x116/0x1d0
[   15.087427]  ? __pfx_kthread+0x10/0x10
[   15.087445]  ret_from_fork_asm+0x1a/0x30
[   15.087475]  </TASK>
[   15.087488] 
[   15.099985] Allocated by task 249:
[   15.100367]  kasan_save_stack+0x45/0x70
[   15.100540]  kasan_save_track+0x18/0x40
[   15.101097]  kasan_save_alloc_info+0x3b/0x50
[   15.101345]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   15.102004]  remove_element+0x11e/0x190
[   15.102439]  mempool_alloc_preallocated+0x4d/0x90
[   15.102653]  mempool_uaf_helper+0x96/0x400
[   15.103355]  mempool_slab_uaf+0xea/0x140
[   15.103668]  kunit_try_run_case+0x1a5/0x480
[   15.104213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.104403]  kthread+0x337/0x6f0
[   15.104871]  ret_from_fork+0x116/0x1d0
[   15.105027]  ret_from_fork_asm+0x1a/0x30
[   15.105383] 
[   15.105481] Freed by task 249:
[   15.106113]  kasan_save_stack+0x45/0x70
[   15.106903]  kasan_save_track+0x18/0x40
[   15.107098]  kasan_save_free_info+0x3f/0x60
[   15.107645]  __kasan_mempool_poison_object+0x131/0x1d0
[   15.107841]  mempool_free+0x2ec/0x380
[   15.108355]  mempool_uaf_helper+0x11a/0x400
[   15.109017]  mempool_slab_uaf+0xea/0x140
[   15.109270]  kunit_try_run_case+0x1a5/0x480
[   15.109433]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.110097]  kthread+0x337/0x6f0
[   15.110411]  ret_from_fork+0x116/0x1d0
[   15.110561]  ret_from_fork_asm+0x1a/0x30
[   15.111115] 
[   15.111287] The buggy address belongs to the object at ffff888102abb240
[   15.111287]  which belongs to the cache test_cache of size 123
[   15.112170] The buggy address is located 0 bytes inside of
[   15.112170]  freed 123-byte region [ffff888102abb240, ffff888102abb2bb)
[   15.112935] 
[   15.113291] The buggy address belongs to the physical page:
[   15.113691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102abb
[   15.114308] flags: 0x200000000000000(node=0|zone=2)
[   15.114547] page_type: f5(slab)
[   15.115216] raw: 0200000000000000 ffff888102ab9000 dead000000000122 0000000000000000
[   15.115381] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   15.115632] page dumped because: kasan: bad access detected
[   15.115953] 
[   15.116177] Memory state around the buggy address:
[   15.116456]  ffff888102abb100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.116962]  ffff888102abb180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.117756] >ffff888102abb200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   15.118352]                                            ^
[   15.118560]  ffff888102abb280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.119215]  ffff888102abb300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.119544] ==================================================================

[   15.179551] ==================================================================
[   15.180085] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   15.180336] Read of size 1 at addr ffff8881039f2240 by task kunit_try_catch/248
[   15.180569] 
[   15.180663] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.180709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.180722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.180745] Call Trace:
[   15.180757]  <TASK>
[   15.180774]  dump_stack_lvl+0x73/0xb0
[   15.180804]  print_report+0xd1/0x650
[   15.180827]  ? __virt_addr_valid+0x1db/0x2d0
[   15.180851]  ? mempool_uaf_helper+0x392/0x400
[   15.180874]  ? kasan_complete_mode_report_info+0x64/0x200
[   15.180900]  ? mempool_uaf_helper+0x392/0x400
[   15.180922]  kasan_report+0x141/0x180
[   15.180946]  ? mempool_uaf_helper+0x392/0x400
[   15.180973]  __asan_report_load1_noabort+0x18/0x20
[   15.180998]  mempool_uaf_helper+0x392/0x400
[   15.181060]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   15.181096]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.181149]  ? finish_task_switch.isra.0+0x153/0x700
[   15.181174]  mempool_slab_uaf+0xea/0x140
[   15.181197]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   15.181224]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   15.181249]  ? __pfx_mempool_free_slab+0x10/0x10
[   15.181275]  ? __pfx_read_tsc+0x10/0x10
[   15.181297]  ? ktime_get_ts64+0x86/0x230
[   15.181321]  kunit_try_run_case+0x1a5/0x480
[   15.181346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.181368]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.181392]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.181415]  ? __kthread_parkme+0x82/0x180
[   15.181436]  ? preempt_count_sub+0x50/0x80
[   15.181459]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.181482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.181505]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.181531]  kthread+0x337/0x6f0
[   15.181551]  ? trace_preempt_on+0x20/0xc0
[   15.181574]  ? __pfx_kthread+0x10/0x10
[   15.181595]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.181616]  ? calculate_sigpending+0x7b/0xa0
[   15.181640]  ? __pfx_kthread+0x10/0x10
[   15.181661]  ret_from_fork+0x116/0x1d0
[   15.181680]  ? __pfx_kthread+0x10/0x10
[   15.181700]  ret_from_fork_asm+0x1a/0x30
[   15.181740]  </TASK>
[   15.181752] 
[   15.191074] Allocated by task 248:
[   15.191277]  kasan_save_stack+0x45/0x70
[   15.191444]  kasan_save_track+0x18/0x40
[   15.191630]  kasan_save_alloc_info+0x3b/0x50
[   15.191839]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   15.192157]  remove_element+0x11e/0x190
[   15.192303]  mempool_alloc_preallocated+0x4d/0x90
[   15.192470]  mempool_uaf_helper+0x96/0x400
[   15.192684]  mempool_slab_uaf+0xea/0x140
[   15.193147]  kunit_try_run_case+0x1a5/0x480
[   15.193361]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.193629]  kthread+0x337/0x6f0
[   15.193849]  ret_from_fork+0x116/0x1d0
[   15.194037]  ret_from_fork_asm+0x1a/0x30
[   15.194194] 
[   15.194269] Freed by task 248:
[   15.194401]  kasan_save_stack+0x45/0x70
[   15.194602]  kasan_save_track+0x18/0x40
[   15.194799]  kasan_save_free_info+0x3f/0x60
[   15.195022]  __kasan_mempool_poison_object+0x131/0x1d0
[   15.195209]  mempool_free+0x2ec/0x380
[   15.195347]  mempool_uaf_helper+0x11a/0x400
[   15.195496]  mempool_slab_uaf+0xea/0x140
[   15.195639]  kunit_try_run_case+0x1a5/0x480
[   15.195972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.196290]  kthread+0x337/0x6f0
[   15.196466]  ret_from_fork+0x116/0x1d0
[   15.196659]  ret_from_fork_asm+0x1a/0x30
[   15.197118] 
[   15.197226] The buggy address belongs to the object at ffff8881039f2240
[   15.197226]  which belongs to the cache test_cache of size 123
[   15.198033] The buggy address is located 0 bytes inside of
[   15.198033]  freed 123-byte region [ffff8881039f2240, ffff8881039f22bb)
[   15.198407] 
[   15.198510] The buggy address belongs to the physical page:
[   15.198878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f2
[   15.199259] flags: 0x200000000000000(node=0|zone=2)
[   15.199506] page_type: f5(slab)
[   15.199683] raw: 0200000000000000 ffff888101601a00 dead000000000122 0000000000000000
[   15.200004] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   15.200338] page dumped because: kasan: bad access detected
[   15.200579] 
[   15.200677] Memory state around the buggy address:
[   15.200969]  ffff8881039f2100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.201257]  ffff8881039f2180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.201569] >ffff8881039f2200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   15.201867]                                            ^
[   15.202046]  ffff8881039f2280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.202393]  ffff8881039f2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.202703] ==================================================================
[   15.106164] ==================================================================
[   15.107822] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   15.109121] Read of size 1 at addr ffff8881031c0700 by task kunit_try_catch/244
[   15.109480] 
[   15.109632] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.109681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.109694] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.109869] Call Trace:
[   15.109911]  <TASK>
[   15.109928]  dump_stack_lvl+0x73/0xb0
[   15.109959]  print_report+0xd1/0x650
[   15.109982]  ? __virt_addr_valid+0x1db/0x2d0
[   15.110004]  ? mempool_uaf_helper+0x392/0x400
[   15.110027]  ? kasan_complete_mode_report_info+0x64/0x200
[   15.110065]  ? mempool_uaf_helper+0x392/0x400
[   15.110088]  kasan_report+0x141/0x180
[   15.110110]  ? mempool_uaf_helper+0x392/0x400
[   15.110138]  __asan_report_load1_noabort+0x18/0x20
[   15.110162]  mempool_uaf_helper+0x392/0x400
[   15.110185]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   15.110210]  ? __kasan_check_write+0x18/0x20
[   15.110230]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.110252]  ? finish_task_switch.isra.0+0x153/0x700
[   15.110279]  mempool_kmalloc_uaf+0xef/0x140
[   15.110301]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   15.110327]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.110350]  ? __pfx_mempool_kfree+0x10/0x10
[   15.110376]  ? __pfx_read_tsc+0x10/0x10
[   15.110396]  ? ktime_get_ts64+0x86/0x230
[   15.110421]  kunit_try_run_case+0x1a5/0x480
[   15.110446]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.110469]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.110492]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.110514]  ? __kthread_parkme+0x82/0x180
[   15.110535]  ? preempt_count_sub+0x50/0x80
[   15.110559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.110583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.110606]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.110629]  kthread+0x337/0x6f0
[   15.110648]  ? trace_preempt_on+0x20/0xc0
[   15.110671]  ? __pfx_kthread+0x10/0x10
[   15.110692]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.110744]  ? calculate_sigpending+0x7b/0xa0
[   15.110770]  ? __pfx_kthread+0x10/0x10
[   15.110792]  ret_from_fork+0x116/0x1d0
[   15.110811]  ? __pfx_kthread+0x10/0x10
[   15.110831]  ret_from_fork_asm+0x1a/0x30
[   15.110863]  </TASK>
[   15.110875] 
[   15.124282] Allocated by task 244:
[   15.124536]  kasan_save_stack+0x45/0x70
[   15.124741]  kasan_save_track+0x18/0x40
[   15.125236]  kasan_save_alloc_info+0x3b/0x50
[   15.125539]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   15.126061]  remove_element+0x11e/0x190
[   15.126266]  mempool_alloc_preallocated+0x4d/0x90
[   15.126634]  mempool_uaf_helper+0x96/0x400
[   15.126932]  mempool_kmalloc_uaf+0xef/0x140
[   15.127277]  kunit_try_run_case+0x1a5/0x480
[   15.127831]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.128256]  kthread+0x337/0x6f0
[   15.128553]  ret_from_fork+0x116/0x1d0
[   15.128888]  ret_from_fork_asm+0x1a/0x30
[   15.129297] 
[   15.129432] Freed by task 244:
[   15.129591]  kasan_save_stack+0x45/0x70
[   15.130108]  kasan_save_track+0x18/0x40
[   15.130313]  kasan_save_free_info+0x3f/0x60
[   15.130645]  __kasan_mempool_poison_object+0x131/0x1d0
[   15.131044]  mempool_free+0x2ec/0x380
[   15.131283]  mempool_uaf_helper+0x11a/0x400
[   15.131483]  mempool_kmalloc_uaf+0xef/0x140
[   15.131702]  kunit_try_run_case+0x1a5/0x480
[   15.132255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.132581]  kthread+0x337/0x6f0
[   15.132947]  ret_from_fork+0x116/0x1d0
[   15.133162]  ret_from_fork_asm+0x1a/0x30
[   15.133432] 
[   15.133535] The buggy address belongs to the object at ffff8881031c0700
[   15.133535]  which belongs to the cache kmalloc-128 of size 128
[   15.134307] The buggy address is located 0 bytes inside of
[   15.134307]  freed 128-byte region [ffff8881031c0700, ffff8881031c0780)
[   15.135213] 
[   15.135331] The buggy address belongs to the physical page:
[   15.135596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c0
[   15.136264] flags: 0x200000000000000(node=0|zone=2)
[   15.136601] page_type: f5(slab)
[   15.136816] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.137493] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.137989] page dumped because: kasan: bad access detected
[   15.138636] 
[   15.138771] Memory state around the buggy address:
[   15.139004]  ffff8881031c0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.139339]  ffff8881031c0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.139662] >ffff8881031c0700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.140660]                    ^
[   15.140974]  ffff8881031c0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.141314]  ffff8881031c0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.141852] ==================================================================

[   36.861626] ==================================================================
[   36.873131] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   36.880272] Read of size 1 at addr ffff888105ba0f00 by task kunit_try_catch/268
[   36.887586] 
[   36.889089] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   36.889098] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   36.889101] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   36.889105] Call Trace:
[   36.889107]  <TASK>
[   36.889108]  dump_stack_lvl+0x73/0xb0
[   36.889113]  print_report+0xd1/0x650
[   36.889117]  ? __virt_addr_valid+0x1db/0x2d0
[   36.889122]  ? mempool_uaf_helper+0x392/0x400
[   36.889126]  ? kasan_complete_mode_report_info+0x64/0x200
[   36.889131]  ? mempool_uaf_helper+0x392/0x400
[   36.889135]  kasan_report+0x141/0x180
[   36.889139]  ? mempool_uaf_helper+0x392/0x400
[   36.889144]  __asan_report_load1_noabort+0x18/0x20
[   36.889149]  mempool_uaf_helper+0x392/0x400
[   36.889153]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   36.889158]  ? __pfx_sched_clock_cpu+0x10/0x10
[   36.889162]  ? finish_task_switch.isra.0+0x153/0x700
[   36.889166]  mempool_kmalloc_uaf+0xef/0x140
[   36.889170]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   36.889175]  ? __pfx_mempool_kmalloc+0x10/0x10
[   36.889180]  ? __pfx_mempool_kfree+0x10/0x10
[   36.889185]  ? ktime_get_ts64+0x83/0x230
[   36.889189]  kunit_try_run_case+0x1a2/0x480
[   36.889194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.889198]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   36.889203]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   36.889207]  ? __kthread_parkme+0x82/0x180
[   36.889210]  ? preempt_count_sub+0x50/0x80
[   36.889215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.889219]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   36.889223]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   36.889228]  kthread+0x334/0x6f0
[   36.889231]  ? trace_preempt_on+0x20/0xc0
[   36.889235]  ? __pfx_kthread+0x10/0x10
[   36.889239]  ? _raw_spin_unlock_irq+0x47/0x80
[   36.889243]  ? calculate_sigpending+0x7b/0xa0
[   36.889247]  ? __pfx_kthread+0x10/0x10
[   36.889251]  ret_from_fork+0x113/0x1d0
[   36.889255]  ? __pfx_kthread+0x10/0x10
[   36.889258]  ret_from_fork_asm+0x1a/0x30
[   36.889264]  </TASK>
[   36.889266] 
[   37.077760] Allocated by task 268:
[   37.081165]  kasan_save_stack+0x45/0x70
[   37.085005]  kasan_save_track+0x18/0x40
[   37.088844]  kasan_save_alloc_info+0x3b/0x50
[   37.093115]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   37.098430]  remove_element+0x11e/0x190
[   37.102276]  mempool_alloc_preallocated+0x4d/0x90
[   37.106984]  mempool_uaf_helper+0x96/0x400
[   37.111090]  mempool_kmalloc_uaf+0xef/0x140
[   37.115277]  kunit_try_run_case+0x1a2/0x480
[   37.119462]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   37.124860]  kthread+0x334/0x6f0
[   37.128093]  ret_from_fork+0x113/0x1d0
[   37.131847]  ret_from_fork_asm+0x1a/0x30
[   37.135774] 
[   37.137274] Freed by task 268:
[   37.140350]  kasan_save_stack+0x45/0x70
[   37.144197]  kasan_save_track+0x18/0x40
[   37.148035]  kasan_save_free_info+0x3f/0x60
[   37.152223]  __kasan_mempool_poison_object+0x131/0x1d0
[   37.157394]  mempool_free+0x2ec/0x380
[   37.161062]  mempool_uaf_helper+0x11a/0x400
[   37.165247]  mempool_kmalloc_uaf+0xef/0x140
[   37.169433]  kunit_try_run_case+0x1a2/0x480
[   37.173621]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   37.179019]  kthread+0x334/0x6f0
[   37.182251]  ret_from_fork+0x113/0x1d0
[   37.186006]  ret_from_fork_asm+0x1a/0x30
[   37.189930] 
[   37.191430] The buggy address belongs to the object at ffff888105ba0f00
[   37.191430]  which belongs to the cache kmalloc-128 of size 128
[   37.203943] The buggy address is located 0 bytes inside of
[   37.203943]  freed 128-byte region [ffff888105ba0f00, ffff888105ba0f80)
[   37.216026] 
[   37.217526] The buggy address belongs to the physical page:
[   37.223098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ba0
[   37.231105] flags: 0x200000000000000(node=0|zone=2)
[   37.235984] page_type: f5(slab)
[   37.239132] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   37.246881] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   37.254628] page dumped because: kasan: bad access detected
[   37.260200] 
[   37.261700] Memory state around the buggy address:
[   37.266492]  ffff888105ba0e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.273712]  ffff888105ba0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.280931] >ffff888105ba0f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.288149]                    ^
[   37.291407]  ffff888105ba0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.298629]  ffff888105ba1000: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc
[   37.305847] ==================================================================
[   37.668902] ==================================================================
[   37.680663] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   37.687801] Read of size 1 at addr ffff8881066ea240 by task kunit_try_catch/272
[   37.695110] 
[   37.696609] CPU: 3 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   37.696618] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   37.696620] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   37.696624] Call Trace:
[   37.696626]  <TASK>
[   37.696628]  dump_stack_lvl+0x73/0xb0
[   37.696632]  print_report+0xd1/0x650
[   37.696636]  ? __virt_addr_valid+0x1db/0x2d0
[   37.696641]  ? mempool_uaf_helper+0x392/0x400
[   37.696645]  ? kasan_complete_mode_report_info+0x64/0x200
[   37.696650]  ? mempool_uaf_helper+0x392/0x400
[   37.696654]  kasan_report+0x141/0x180
[   37.696658]  ? mempool_uaf_helper+0x392/0x400
[   37.696663]  __asan_report_load1_noabort+0x18/0x20
[   37.696668]  mempool_uaf_helper+0x392/0x400
[   37.696672]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   37.696677]  ? __pfx_sched_clock_cpu+0x10/0x10
[   37.696680]  ? finish_task_switch.isra.0+0x153/0x700
[   37.696685]  mempool_slab_uaf+0xea/0x140
[   37.696689]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   37.696694]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   37.696699]  ? __pfx_mempool_free_slab+0x10/0x10
[   37.696704]  ? ktime_get_ts64+0x83/0x230
[   37.696708]  kunit_try_run_case+0x1a2/0x480
[   37.696713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   37.696717]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   37.696722]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   37.696726]  ? __kthread_parkme+0x82/0x180
[   37.696729]  ? preempt_count_sub+0x50/0x80
[   37.696733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   37.696738]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   37.696742]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   37.696747]  kthread+0x334/0x6f0
[   37.696750]  ? trace_preempt_on+0x20/0xc0
[   37.696754]  ? __pfx_kthread+0x10/0x10
[   37.696758]  ? _raw_spin_unlock_irq+0x47/0x80
[   37.696762]  ? calculate_sigpending+0x7b/0xa0
[   37.696766]  ? __pfx_kthread+0x10/0x10
[   37.696770]  ret_from_fork+0x113/0x1d0
[   37.696773]  ? __pfx_kthread+0x10/0x10
[   37.696777]  ret_from_fork_asm+0x1a/0x30
[   37.696783]  </TASK>
[   37.696784] 
[   37.885308] Allocated by task 272:
[   37.888712]  kasan_save_stack+0x45/0x70
[   37.892553]  kasan_save_track+0x18/0x40
[   37.896404]  kasan_save_alloc_info+0x3b/0x50
[   37.900680]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   37.905992]  remove_element+0x11e/0x190
[   37.909833]  mempool_alloc_preallocated+0x4d/0x90
[   37.914538]  mempool_uaf_helper+0x96/0x400
[   37.918638]  mempool_slab_uaf+0xea/0x140
[   37.922562]  kunit_try_run_case+0x1a2/0x480
[   37.926749]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   37.932151]  kthread+0x334/0x6f0
[   37.935404]  ret_from_fork+0x113/0x1d0
[   37.939161]  ret_from_fork_asm+0x1a/0x30
[   37.943087] 
[   37.944587] Freed by task 272:
[   37.947646]  kasan_save_stack+0x45/0x70
[   37.951486]  kasan_save_track+0x18/0x40
[   37.955323]  kasan_save_free_info+0x3f/0x60
[   37.959536]  __kasan_mempool_poison_object+0x131/0x1d0
[   37.964676]  mempool_free+0x2ec/0x380
[   37.968359]  mempool_uaf_helper+0x11a/0x400
[   37.972562]  mempool_slab_uaf+0xea/0x140
[   37.976488]  kunit_try_run_case+0x1a2/0x480
[   37.980674]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   37.986073]  kthread+0x334/0x6f0
[   37.989304]  ret_from_fork+0x113/0x1d0
[   37.993058]  ret_from_fork_asm+0x1a/0x30
[   37.996986] 
[   37.998483] The buggy address belongs to the object at ffff8881066ea240
[   37.998483]  which belongs to the cache test_cache of size 123
[   38.010911] The buggy address is located 0 bytes inside of
[   38.010911]  freed 123-byte region [ffff8881066ea240, ffff8881066ea2bb)
[   38.022994] 
[   38.024492] The buggy address belongs to the physical page:
[   38.030066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   38.038072] flags: 0x200000000000000(node=0|zone=2)
[   38.042952] page_type: f5(slab)
[   38.046099] raw: 0200000000000000 ffff888103805400 dead000000000122 0000000000000000
[   38.053847] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   38.061587] page dumped because: kasan: bad access detected
[   38.067158] 
[   38.068658] Memory state around the buggy address:
[   38.073452]  ffff8881066ea100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.080678]  ffff8881066ea180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.087899] >ffff8881066ea200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   38.095118]                                            ^
[   38.100429]  ffff8881066ea280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.107650]  ffff8881066ea300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.114867] ==================================================================