Hay
Date
July 13, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.945002] ==================================================================
[   17.945062] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   17.945113] Read of size 1 at addr fff00000c58c2240 by task kunit_try_catch/232
[   17.945161] 
[   17.945192] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.945389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.945477] Hardware name: linux,dummy-virt (DT)
[   17.945511] Call trace:
[   17.945561]  show_stack+0x20/0x38 (C)
[   17.945613]  dump_stack_lvl+0x8c/0xd0
[   17.945698]  print_report+0x118/0x5d0
[   17.945743]  kasan_report+0xdc/0x128
[   17.945839]  __asan_report_load1_noabort+0x20/0x30
[   17.945888]  mempool_uaf_helper+0x314/0x340
[   17.945934]  mempool_slab_uaf+0xc0/0x118
[   17.945977]  kunit_try_run_case+0x170/0x3f0
[   17.946024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.946074]  kthread+0x328/0x630
[   17.946143]  ret_from_fork+0x10/0x20
[   17.946188] 
[   17.946219] Allocated by task 232:
[   17.946247]  kasan_save_stack+0x3c/0x68
[   17.946286]  kasan_save_track+0x20/0x40
[   17.946367]  kasan_save_alloc_info+0x40/0x58
[   17.946406]  __kasan_mempool_unpoison_object+0xbc/0x180
[   17.946448]  remove_element+0x16c/0x1f8
[   17.946512]  mempool_alloc_preallocated+0x58/0xc0
[   17.946588]  mempool_uaf_helper+0xa4/0x340
[   17.946655]  mempool_slab_uaf+0xc0/0x118
[   17.946718]  kunit_try_run_case+0x170/0x3f0
[   17.946775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.946820]  kthread+0x328/0x630
[   17.946893]  ret_from_fork+0x10/0x20
[   17.946938] 
[   17.946956] Freed by task 232:
[   17.946980]  kasan_save_stack+0x3c/0x68
[   17.947017]  kasan_save_track+0x20/0x40
[   17.947052]  kasan_save_free_info+0x4c/0x78
[   17.947101]  __kasan_mempool_poison_object+0xc0/0x150
[   17.947143]  mempool_free+0x28c/0x328
[   17.947176]  mempool_uaf_helper+0x104/0x340
[   17.947223]  mempool_slab_uaf+0xc0/0x118
[   17.947257]  kunit_try_run_case+0x170/0x3f0
[   17.947295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.947356]  kthread+0x328/0x630
[   17.947388]  ret_from_fork+0x10/0x20
[   17.947422] 
[   17.947461] The buggy address belongs to the object at fff00000c58c2240
[   17.947461]  which belongs to the cache test_cache of size 123
[   17.947521] The buggy address is located 0 bytes inside of
[   17.947521]  freed 123-byte region [fff00000c58c2240, fff00000c58c22bb)
[   17.947602] 
[   17.947639] The buggy address belongs to the physical page:
[   17.947672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c2
[   17.947866] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.947947] page_type: f5(slab)
[   17.948088] raw: 0bfffe0000000000 fff00000c708c640 dead000000000122 0000000000000000
[   17.948154] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   17.948342] page dumped because: kasan: bad access detected
[   17.948458] 
[   17.948546] Memory state around the buggy address:
[   17.948615]  fff00000c58c2100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.948660]  fff00000c58c2180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.948713] >fff00000c58c2200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   17.948752]                                            ^
[   17.948789]  fff00000c58c2280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.948832]  fff00000c58c2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.949224] ==================================================================
[   17.921643] ==================================================================
[   17.921713] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   17.921775] Read of size 1 at addr fff00000c5866e00 by task kunit_try_catch/228
[   17.921826] 
[   17.921867] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.921953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.921979] Hardware name: linux,dummy-virt (DT)
[   17.922014] Call trace:
[   17.922037]  show_stack+0x20/0x38 (C)
[   17.922088]  dump_stack_lvl+0x8c/0xd0
[   17.922136]  print_report+0x118/0x5d0
[   17.922184]  kasan_report+0xdc/0x128
[   17.922254]  __asan_report_load1_noabort+0x20/0x30
[   17.922305]  mempool_uaf_helper+0x314/0x340
[   17.922351]  mempool_kmalloc_uaf+0xc4/0x120
[   17.922396]  kunit_try_run_case+0x170/0x3f0
[   17.922444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.922497]  kthread+0x328/0x630
[   17.922538]  ret_from_fork+0x10/0x20
[   17.922585] 
[   17.922604] Allocated by task 228:
[   17.922634]  kasan_save_stack+0x3c/0x68
[   17.922674]  kasan_save_track+0x20/0x40
[   17.922712]  kasan_save_alloc_info+0x40/0x58
[   17.922752]  __kasan_mempool_unpoison_object+0x11c/0x180
[   17.922797]  remove_element+0x130/0x1f8
[   17.922833]  mempool_alloc_preallocated+0x58/0xc0
[   17.922873]  mempool_uaf_helper+0xa4/0x340
[   17.922909]  mempool_kmalloc_uaf+0xc4/0x120
[   17.922946]  kunit_try_run_case+0x170/0x3f0
[   17.922985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.923029]  kthread+0x328/0x630
[   17.923061]  ret_from_fork+0x10/0x20
[   17.923098] 
[   17.923115] Freed by task 228:
[   17.923142]  kasan_save_stack+0x3c/0x68
[   17.923178]  kasan_save_track+0x20/0x40
[   17.923227]  kasan_save_free_info+0x4c/0x78
[   17.923267]  __kasan_mempool_poison_object+0xc0/0x150
[   17.923310]  mempool_free+0x28c/0x328
[   17.923345]  mempool_uaf_helper+0x104/0x340
[   17.923385]  mempool_kmalloc_uaf+0xc4/0x120
[   17.923422]  kunit_try_run_case+0x170/0x3f0
[   17.923460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.923504]  kthread+0x328/0x630
[   17.923537]  ret_from_fork+0x10/0x20
[   17.923573] 
[   17.923592] The buggy address belongs to the object at fff00000c5866e00
[   17.923592]  which belongs to the cache kmalloc-128 of size 128
[   17.923654] The buggy address is located 0 bytes inside of
[   17.923654]  freed 128-byte region [fff00000c5866e00, fff00000c5866e80)
[   17.923718] 
[   17.923739] The buggy address belongs to the physical page:
[   17.923773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105866
[   17.923830] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.923883] page_type: f5(slab)
[   17.923923] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.923975] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.924015] page dumped because: kasan: bad access detected
[   17.924047] 
[   17.924064] Memory state around the buggy address:
[   17.924096]  fff00000c5866d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.924170]  fff00000c5866d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.924223] >fff00000c5866e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.924262]                    ^
[   17.924288]  fff00000c5866e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.924331]  fff00000c5866f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.924371] ==================================================================

[   18.647085] ==================================================================
[   18.647275] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   18.647356] Read of size 1 at addr fff00000c5aaee00 by task kunit_try_catch/228
[   18.647432] 
[   18.647467] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.647752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.647781] Hardware name: linux,dummy-virt (DT)
[   18.647813] Call trace:
[   18.647947]  show_stack+0x20/0x38 (C)
[   18.648040]  dump_stack_lvl+0x8c/0xd0
[   18.648113]  print_report+0x118/0x5d0
[   18.648160]  kasan_report+0xdc/0x128
[   18.648217]  __asan_report_load1_noabort+0x20/0x30
[   18.648269]  mempool_uaf_helper+0x314/0x340
[   18.648315]  mempool_kmalloc_uaf+0xc4/0x120
[   18.648361]  kunit_try_run_case+0x170/0x3f0
[   18.648409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.648501]  kthread+0x328/0x630
[   18.648711]  ret_from_fork+0x10/0x20
[   18.648935] 
[   18.648982] Allocated by task 228:
[   18.649027]  kasan_save_stack+0x3c/0x68
[   18.649069]  kasan_save_track+0x20/0x40
[   18.649127]  kasan_save_alloc_info+0x40/0x58
[   18.649503]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.649782]  remove_element+0x130/0x1f8
[   18.649906]  mempool_alloc_preallocated+0x58/0xc0
[   18.649956]  mempool_uaf_helper+0xa4/0x340
[   18.650001]  mempool_kmalloc_uaf+0xc4/0x120
[   18.650060]  kunit_try_run_case+0x170/0x3f0
[   18.650105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.650148]  kthread+0x328/0x630
[   18.650547]  ret_from_fork+0x10/0x20
[   18.650590] 
[   18.650622] Freed by task 228:
[   18.650650]  kasan_save_stack+0x3c/0x68
[   18.650688]  kasan_save_track+0x20/0x40
[   18.650725]  kasan_save_free_info+0x4c/0x78
[   18.650850]  __kasan_mempool_poison_object+0xc0/0x150
[   18.651134]  mempool_free+0x28c/0x328
[   18.651279]  mempool_uaf_helper+0x104/0x340
[   18.651339]  mempool_kmalloc_uaf+0xc4/0x120
[   18.651382]  kunit_try_run_case+0x170/0x3f0
[   18.651422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.651467]  kthread+0x328/0x630
[   18.651498]  ret_from_fork+0x10/0x20
[   18.651534] 
[   18.651564] The buggy address belongs to the object at fff00000c5aaee00
[   18.651564]  which belongs to the cache kmalloc-128 of size 128
[   18.651625] The buggy address is located 0 bytes inside of
[   18.651625]  freed 128-byte region [fff00000c5aaee00, fff00000c5aaee80)
[   18.651687] 
[   18.651822] The buggy address belongs to the physical page:
[   18.651953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aae
[   18.652071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.652122] page_type: f5(slab)
[   18.652278] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.652330] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.652411] page dumped because: kasan: bad access detected
[   18.652497] 
[   18.652517] Memory state around the buggy address:
[   18.652605]  fff00000c5aaed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.652752]  fff00000c5aaed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.652795] >fff00000c5aaee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.652878]                    ^
[   18.652906]  fff00000c5aaee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.652950]  fff00000c5aaef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.652994] ==================================================================
[   18.673394] ==================================================================
[   18.673457] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   18.673510] Read of size 1 at addr fff00000c5ae0240 by task kunit_try_catch/232
[   18.673573] 
[   18.673743] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.673961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.674108] Hardware name: linux,dummy-virt (DT)
[   18.674197] Call trace:
[   18.674221]  show_stack+0x20/0x38 (C)
[   18.674267]  dump_stack_lvl+0x8c/0xd0
[   18.674314]  print_report+0x118/0x5d0
[   18.674358]  kasan_report+0xdc/0x128
[   18.674402]  __asan_report_load1_noabort+0x20/0x30
[   18.674451]  mempool_uaf_helper+0x314/0x340
[   18.674496]  mempool_slab_uaf+0xc0/0x118
[   18.674539]  kunit_try_run_case+0x170/0x3f0
[   18.674584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.674992]  kthread+0x328/0x630
[   18.675457]  ret_from_fork+0x10/0x20
[   18.675576] 
[   18.675757] Allocated by task 232:
[   18.675898]  kasan_save_stack+0x3c/0x68
[   18.675944]  kasan_save_track+0x20/0x40
[   18.676151]  kasan_save_alloc_info+0x40/0x58
[   18.676211]  __kasan_mempool_unpoison_object+0xbc/0x180
[   18.676672]  remove_element+0x16c/0x1f8
[   18.676782]  mempool_alloc_preallocated+0x58/0xc0
[   18.676823]  mempool_uaf_helper+0xa4/0x340
[   18.676863]  mempool_slab_uaf+0xc0/0x118
[   18.677159]  kunit_try_run_case+0x170/0x3f0
[   18.677342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.677388]  kthread+0x328/0x630
[   18.677421]  ret_from_fork+0x10/0x20
[   18.677456] 
[   18.677478] Freed by task 232:
[   18.677506]  kasan_save_stack+0x3c/0x68
[   18.677542]  kasan_save_track+0x20/0x40
[   18.677580]  kasan_save_free_info+0x4c/0x78
[   18.677629]  __kasan_mempool_poison_object+0xc0/0x150
[   18.677674]  mempool_free+0x28c/0x328
[   18.677903]  mempool_uaf_helper+0x104/0x340
[   18.678235]  mempool_slab_uaf+0xc0/0x118
[   18.678342]  kunit_try_run_case+0x170/0x3f0
[   18.678481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.678526]  kthread+0x328/0x630
[   18.678820]  ret_from_fork+0x10/0x20
[   18.678862] 
[   18.678902] The buggy address belongs to the object at fff00000c5ae0240
[   18.678902]  which belongs to the cache test_cache of size 123
[   18.679131] The buggy address is located 0 bytes inside of
[   18.679131]  freed 123-byte region [fff00000c5ae0240, fff00000c5ae02bb)
[   18.679216] 
[   18.679236] The buggy address belongs to the physical page:
[   18.679266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae0
[   18.679320] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.679369] page_type: f5(slab)
[   18.679409] raw: 0bfffe0000000000 fff00000c5add000 dead000000000122 0000000000000000
[   18.679459] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   18.679499] page dumped because: kasan: bad access detected
[   18.679531] 
[   18.679548] Memory state around the buggy address:
[   18.679580]  fff00000c5ae0100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.679630]  fff00000c5ae0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.679673] >fff00000c5ae0200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   18.679711]                                            ^
[   18.679746]  fff00000c5ae0280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.679788]  fff00000c5ae0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.679835] ==================================================================

[   14.190356] ==================================================================
[   14.190946] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   14.191275] Read of size 1 at addr ffff888103434300 by task kunit_try_catch/244
[   14.191954] 
[   14.192090] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.192140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.192152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.192176] Call Trace:
[   14.192189]  <TASK>
[   14.192206]  dump_stack_lvl+0x73/0xb0
[   14.192240]  print_report+0xd1/0x610
[   14.192264]  ? __virt_addr_valid+0x1db/0x2d0
[   14.192295]  ? mempool_uaf_helper+0x392/0x400
[   14.192318]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.192343]  ? mempool_uaf_helper+0x392/0x400
[   14.192366]  kasan_report+0x141/0x180
[   14.192388]  ? mempool_uaf_helper+0x392/0x400
[   14.192415]  __asan_report_load1_noabort+0x18/0x20
[   14.192468]  mempool_uaf_helper+0x392/0x400
[   14.192491]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   14.192514]  ? update_load_avg+0x1be/0x21b0
[   14.192540]  ? dequeue_entities+0x27e/0x1740
[   14.192566]  ? finish_task_switch.isra.0+0x153/0x700
[   14.192593]  mempool_kmalloc_uaf+0xef/0x140
[   14.192624]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   14.192650]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.192676]  ? __pfx_mempool_kfree+0x10/0x10
[   14.192701]  ? __pfx_read_tsc+0x10/0x10
[   14.192724]  ? ktime_get_ts64+0x86/0x230
[   14.192750]  kunit_try_run_case+0x1a5/0x480
[   14.192777]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.192800]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.192826]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.192850]  ? __kthread_parkme+0x82/0x180
[   14.192873]  ? preempt_count_sub+0x50/0x80
[   14.192896]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.192921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.192946]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.192972]  kthread+0x337/0x6f0
[   14.192992]  ? trace_preempt_on+0x20/0xc0
[   14.193016]  ? __pfx_kthread+0x10/0x10
[   14.193037]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.193058]  ? calculate_sigpending+0x7b/0xa0
[   14.193083]  ? __pfx_kthread+0x10/0x10
[   14.193105]  ret_from_fork+0x116/0x1d0
[   14.193124]  ? __pfx_kthread+0x10/0x10
[   14.193145]  ret_from_fork_asm+0x1a/0x30
[   14.193177]  </TASK>
[   14.193187] 
[   14.201747] Allocated by task 244:
[   14.201922]  kasan_save_stack+0x45/0x70
[   14.202070]  kasan_save_track+0x18/0x40
[   14.202206]  kasan_save_alloc_info+0x3b/0x50
[   14.202430]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.202702]  remove_element+0x11e/0x190
[   14.202904]  mempool_alloc_preallocated+0x4d/0x90
[   14.203134]  mempool_uaf_helper+0x96/0x400
[   14.203400]  mempool_kmalloc_uaf+0xef/0x140
[   14.203611]  kunit_try_run_case+0x1a5/0x480
[   14.203854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.204052]  kthread+0x337/0x6f0
[   14.204171]  ret_from_fork+0x116/0x1d0
[   14.204363]  ret_from_fork_asm+0x1a/0x30
[   14.204752] 
[   14.204833] Freed by task 244:
[   14.204944]  kasan_save_stack+0x45/0x70
[   14.205135]  kasan_save_track+0x18/0x40
[   14.205319]  kasan_save_free_info+0x3f/0x60
[   14.205554]  __kasan_mempool_poison_object+0x131/0x1d0
[   14.205764]  mempool_free+0x2ec/0x380
[   14.205990]  mempool_uaf_helper+0x11a/0x400
[   14.206178]  mempool_kmalloc_uaf+0xef/0x140
[   14.206376]  kunit_try_run_case+0x1a5/0x480
[   14.206579]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.206755]  kthread+0x337/0x6f0
[   14.206877]  ret_from_fork+0x116/0x1d0
[   14.207010]  ret_from_fork_asm+0x1a/0x30
[   14.207149] 
[   14.207219] The buggy address belongs to the object at ffff888103434300
[   14.207219]  which belongs to the cache kmalloc-128 of size 128
[   14.207723] The buggy address is located 0 bytes inside of
[   14.207723]  freed 128-byte region [ffff888103434300, ffff888103434380)
[   14.208679] 
[   14.208778] The buggy address belongs to the physical page:
[   14.209028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103434
[   14.209302] flags: 0x200000000000000(node=0|zone=2)
[   14.209644] page_type: f5(slab)
[   14.209931] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.210161] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.210386] page dumped because: kasan: bad access detected
[   14.210785] 
[   14.210933] Memory state around the buggy address:
[   14.211159]  ffff888103434200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.211510]  ffff888103434280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.211822] >ffff888103434300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.212102]                    ^
[   14.212346]  ffff888103434380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.212910]  ffff888103434400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.213149] ==================================================================
[   14.240294] ==================================================================
[   14.241952] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   14.242286] Read of size 1 at addr ffff8881026d3240 by task kunit_try_catch/248
[   14.242609] 
[   14.242716] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.242761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.242773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.242794] Call Trace:
[   14.242807]  <TASK>
[   14.242822]  dump_stack_lvl+0x73/0xb0
[   14.242852]  print_report+0xd1/0x610
[   14.242875]  ? __virt_addr_valid+0x1db/0x2d0
[   14.242898]  ? mempool_uaf_helper+0x392/0x400
[   14.242921]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.242946]  ? mempool_uaf_helper+0x392/0x400
[   14.242968]  kasan_report+0x141/0x180
[   14.242990]  ? mempool_uaf_helper+0x392/0x400
[   14.243018]  __asan_report_load1_noabort+0x18/0x20
[   14.243043]  mempool_uaf_helper+0x392/0x400
[   14.243067]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   14.243089]  ? update_load_avg+0x1be/0x21b0
[   14.243117]  ? finish_task_switch.isra.0+0x153/0x700
[   14.243143]  mempool_slab_uaf+0xea/0x140
[   14.243165]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   14.243192]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   14.243219]  ? __pfx_mempool_free_slab+0x10/0x10
[   14.243246]  ? __pfx_read_tsc+0x10/0x10
[   14.243267]  ? ktime_get_ts64+0x86/0x230
[   14.243291]  kunit_try_run_case+0x1a5/0x480
[   14.243316]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.243340]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.243364]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.243389]  ? __kthread_parkme+0x82/0x180
[   14.243410]  ? preempt_count_sub+0x50/0x80
[   14.243434]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.243622]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.243652]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.243679]  kthread+0x337/0x6f0
[   14.243698]  ? trace_preempt_on+0x20/0xc0
[   14.243723]  ? __pfx_kthread+0x10/0x10
[   14.243744]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.243766]  ? calculate_sigpending+0x7b/0xa0
[   14.243792]  ? __pfx_kthread+0x10/0x10
[   14.243813]  ret_from_fork+0x116/0x1d0
[   14.243832]  ? __pfx_kthread+0x10/0x10
[   14.243853]  ret_from_fork_asm+0x1a/0x30
[   14.243884]  </TASK>
[   14.243894] 
[   14.251965] Allocated by task 248:
[   14.252093]  kasan_save_stack+0x45/0x70
[   14.252237]  kasan_save_track+0x18/0x40
[   14.252404]  kasan_save_alloc_info+0x3b/0x50
[   14.254368]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   14.254656]  remove_element+0x11e/0x190
[   14.254859]  mempool_alloc_preallocated+0x4d/0x90
[   14.255043]  mempool_uaf_helper+0x96/0x400
[   14.255279]  mempool_slab_uaf+0xea/0x140
[   14.255469]  kunit_try_run_case+0x1a5/0x480
[   14.255645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.255823]  kthread+0x337/0x6f0
[   14.255988]  ret_from_fork+0x116/0x1d0
[   14.256175]  ret_from_fork_asm+0x1a/0x30
[   14.256377] 
[   14.256485] Freed by task 248:
[   14.256609]  kasan_save_stack+0x45/0x70
[   14.256803]  kasan_save_track+0x18/0x40
[   14.256959]  kasan_save_free_info+0x3f/0x60
[   14.257154]  __kasan_mempool_poison_object+0x131/0x1d0
[   14.257324]  mempool_free+0x2ec/0x380
[   14.257831]  mempool_uaf_helper+0x11a/0x400
[   14.258051]  mempool_slab_uaf+0xea/0x140
[   14.258250]  kunit_try_run_case+0x1a5/0x480
[   14.258503]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.258808]  kthread+0x337/0x6f0
[   14.258951]  ret_from_fork+0x116/0x1d0
[   14.259096]  ret_from_fork_asm+0x1a/0x30
[   14.259296] 
[   14.259410] The buggy address belongs to the object at ffff8881026d3240
[   14.259410]  which belongs to the cache test_cache of size 123
[   14.259993] The buggy address is located 0 bytes inside of
[   14.259993]  freed 123-byte region [ffff8881026d3240, ffff8881026d32bb)
[   14.260366] 
[   14.260476] The buggy address belongs to the physical page:
[   14.260927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d3
[   14.261290] flags: 0x200000000000000(node=0|zone=2)
[   14.261472] page_type: f5(slab)
[   14.261729] raw: 0200000000000000 ffff8881009fcb40 dead000000000122 0000000000000000
[   14.262053] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   14.262344] page dumped because: kasan: bad access detected
[   14.262693] 
[   14.262786] Memory state around the buggy address:
[   14.262997]  ffff8881026d3100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.263263]  ffff8881026d3180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.263661] >ffff8881026d3200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   14.263877]                                            ^
[   14.264121]  ffff8881026d3280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.264463]  ffff8881026d3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.264982] ==================================================================

[   14.449206] ==================================================================
[   14.450008] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   14.451611] Read of size 1 at addr ffff888102b50240 by task kunit_try_catch/249
[   14.451994] 
[   14.452115] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.452172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.452184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.452206] Call Trace:
[   14.452218]  <TASK>
[   14.452234]  dump_stack_lvl+0x73/0xb0
[   14.452267]  print_report+0xd1/0x610
[   14.452291]  ? __virt_addr_valid+0x1db/0x2d0
[   14.452315]  ? mempool_uaf_helper+0x392/0x400
[   14.452338]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.452362]  ? mempool_uaf_helper+0x392/0x400
[   14.452386]  kasan_report+0x141/0x180
[   14.452409]  ? mempool_uaf_helper+0x392/0x400
[   14.452436]  __asan_report_load1_noabort+0x18/0x20
[   14.452463]  mempool_uaf_helper+0x392/0x400
[   14.452486]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   14.452513]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.452537]  ? finish_task_switch.isra.0+0x153/0x700
[   14.452564]  mempool_slab_uaf+0xea/0x140
[   14.452587]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   14.452614]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   14.452640]  ? __pfx_mempool_free_slab+0x10/0x10
[   14.452741]  ? __pfx_read_tsc+0x10/0x10
[   14.452766]  ? ktime_get_ts64+0x86/0x230
[   14.452791]  kunit_try_run_case+0x1a5/0x480
[   14.452818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.452841]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.452866]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.452890]  ? __kthread_parkme+0x82/0x180
[   14.452911]  ? preempt_count_sub+0x50/0x80
[   14.452935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.452960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.452985]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.453011]  kthread+0x337/0x6f0
[   14.453030]  ? trace_preempt_on+0x20/0xc0
[   14.453069]  ? __pfx_kthread+0x10/0x10
[   14.453089]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.453112]  ? calculate_sigpending+0x7b/0xa0
[   14.453148]  ? __pfx_kthread+0x10/0x10
[   14.453169]  ret_from_fork+0x116/0x1d0
[   14.453190]  ? __pfx_kthread+0x10/0x10
[   14.453210]  ret_from_fork_asm+0x1a/0x30
[   14.453242]  </TASK>
[   14.453252] 
[   14.461437] Allocated by task 249:
[   14.461571]  kasan_save_stack+0x45/0x70
[   14.461836]  kasan_save_track+0x18/0x40
[   14.462086]  kasan_save_alloc_info+0x3b/0x50
[   14.462313]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   14.462572]  remove_element+0x11e/0x190
[   14.462892]  mempool_alloc_preallocated+0x4d/0x90
[   14.463136]  mempool_uaf_helper+0x96/0x400
[   14.463296]  mempool_slab_uaf+0xea/0x140
[   14.463438]  kunit_try_run_case+0x1a5/0x480
[   14.463586]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.464150]  kthread+0x337/0x6f0
[   14.464325]  ret_from_fork+0x116/0x1d0
[   14.464520]  ret_from_fork_asm+0x1a/0x30
[   14.464807] 
[   14.464900] Freed by task 249:
[   14.465033]  kasan_save_stack+0x45/0x70
[   14.465185]  kasan_save_track+0x18/0x40
[   14.465320]  kasan_save_free_info+0x3f/0x60
[   14.465467]  __kasan_mempool_poison_object+0x131/0x1d0
[   14.465671]  mempool_free+0x2ec/0x380
[   14.465856]  mempool_uaf_helper+0x11a/0x400
[   14.466071]  mempool_slab_uaf+0xea/0x140
[   14.466390]  kunit_try_run_case+0x1a5/0x480
[   14.466541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.466936]  kthread+0x337/0x6f0
[   14.467122]  ret_from_fork+0x116/0x1d0
[   14.467323]  ret_from_fork_asm+0x1a/0x30
[   14.467517] 
[   14.467589] The buggy address belongs to the object at ffff888102b50240
[   14.467589]  which belongs to the cache test_cache of size 123
[   14.468331] The buggy address is located 0 bytes inside of
[   14.468331]  freed 123-byte region [ffff888102b50240, ffff888102b502bb)
[   14.468883] 
[   14.468990] The buggy address belongs to the physical page:
[   14.469276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b50
[   14.469540] flags: 0x200000000000000(node=0|zone=2)
[   14.469817] page_type: f5(slab)
[   14.469996] raw: 0200000000000000 ffff888101b19dc0 dead000000000122 0000000000000000
[   14.470355] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   14.470722] page dumped because: kasan: bad access detected
[   14.470894] 
[   14.470964] Memory state around the buggy address:
[   14.471304]  ffff888102b50100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.471833]  ffff888102b50180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.472066] >ffff888102b50200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   14.472334]                                            ^
[   14.472580]  ffff888102b50280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.472978]  ffff888102b50300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.473307] ==================================================================
[   14.399550] ==================================================================
[   14.400879] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   14.401205] Read of size 1 at addr ffff888102594900 by task kunit_try_catch/245
[   14.401433] 
[   14.401529] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.401577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.401590] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.401612] Call Trace:
[   14.401626]  <TASK>
[   14.401643]  dump_stack_lvl+0x73/0xb0
[   14.401676]  print_report+0xd1/0x610
[   14.401699]  ? __virt_addr_valid+0x1db/0x2d0
[   14.401725]  ? mempool_uaf_helper+0x392/0x400
[   14.401748]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.401772]  ? mempool_uaf_helper+0x392/0x400
[   14.401796]  kasan_report+0x141/0x180
[   14.401818]  ? mempool_uaf_helper+0x392/0x400
[   14.401846]  __asan_report_load1_noabort+0x18/0x20
[   14.401871]  mempool_uaf_helper+0x392/0x400
[   14.401895]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   14.401920]  ? __kasan_check_write+0x18/0x20
[   14.401941]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.401965]  ? finish_task_switch.isra.0+0x153/0x700
[   14.401993]  mempool_kmalloc_uaf+0xef/0x140
[   14.402016]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   14.402043]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.402080]  ? __pfx_mempool_kfree+0x10/0x10
[   14.402127]  ? __pfx_read_tsc+0x10/0x10
[   14.402150]  ? ktime_get_ts64+0x86/0x230
[   14.402176]  kunit_try_run_case+0x1a5/0x480
[   14.402203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.402227]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.402253]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.402277]  ? __kthread_parkme+0x82/0x180
[   14.402365]  ? preempt_count_sub+0x50/0x80
[   14.402394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.402420]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.402446]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.402472]  kthread+0x337/0x6f0
[   14.402492]  ? trace_preempt_on+0x20/0xc0
[   14.402518]  ? __pfx_kthread+0x10/0x10
[   14.402539]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.402562]  ? calculate_sigpending+0x7b/0xa0
[   14.402604]  ? __pfx_kthread+0x10/0x10
[   14.402625]  ret_from_fork+0x116/0x1d0
[   14.402685]  ? __pfx_kthread+0x10/0x10
[   14.402714]  ret_from_fork_asm+0x1a/0x30
[   14.402747]  </TASK>
[   14.402758] 
[   14.411126] Allocated by task 245:
[   14.411330]  kasan_save_stack+0x45/0x70
[   14.411538]  kasan_save_track+0x18/0x40
[   14.411879]  kasan_save_alloc_info+0x3b/0x50
[   14.412116]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.412385]  remove_element+0x11e/0x190
[   14.412583]  mempool_alloc_preallocated+0x4d/0x90
[   14.412838]  mempool_uaf_helper+0x96/0x400
[   14.413036]  mempool_kmalloc_uaf+0xef/0x140
[   14.413257]  kunit_try_run_case+0x1a5/0x480
[   14.413406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.413583]  kthread+0x337/0x6f0
[   14.413705]  ret_from_fork+0x116/0x1d0
[   14.413877]  ret_from_fork_asm+0x1a/0x30
[   14.414084] 
[   14.414181] Freed by task 245:
[   14.414345]  kasan_save_stack+0x45/0x70
[   14.414813]  kasan_save_track+0x18/0x40
[   14.414972]  kasan_save_free_info+0x3f/0x60
[   14.415211]  __kasan_mempool_poison_object+0x131/0x1d0
[   14.415460]  mempool_free+0x2ec/0x380
[   14.415616]  mempool_uaf_helper+0x11a/0x400
[   14.415897]  mempool_kmalloc_uaf+0xef/0x140
[   14.416094]  kunit_try_run_case+0x1a5/0x480
[   14.416375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.416608]  kthread+0x337/0x6f0
[   14.416897]  ret_from_fork+0x116/0x1d0
[   14.417035]  ret_from_fork_asm+0x1a/0x30
[   14.417189] 
[   14.417353] The buggy address belongs to the object at ffff888102594900
[   14.417353]  which belongs to the cache kmalloc-128 of size 128
[   14.417896] The buggy address is located 0 bytes inside of
[   14.417896]  freed 128-byte region [ffff888102594900, ffff888102594980)
[   14.418502] 
[   14.418597] The buggy address belongs to the physical page:
[   14.418883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102594
[   14.419144] flags: 0x200000000000000(node=0|zone=2)
[   14.419313] page_type: f5(slab)
[   14.419503] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.419843] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.420190] page dumped because: kasan: bad access detected
[   14.420442] 
[   14.420535] Memory state around the buggy address:
[   14.420973]  ffff888102594800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.421340]  ffff888102594880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.421623] >ffff888102594900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.421905]                    ^
[   14.422021]  ffff888102594980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.422517]  ffff888102594a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.423002] ==================================================================