Hay
Date
July 20, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.558263] ==================================================================
[   18.558341] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   18.558407] Read of size 1 at addr fff00000c3eddd00 by task kunit_try_catch/227
[   18.558458] 
[   18.558497] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.558585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.558611] Hardware name: linux,dummy-virt (DT)
[   18.558653] Call trace:
[   18.558679]  show_stack+0x20/0x38 (C)
[   18.558729]  dump_stack_lvl+0x8c/0xd0
[   18.558781]  print_report+0x118/0x5d0
[   18.558828]  kasan_report+0xdc/0x128
[   18.558873]  __asan_report_load1_noabort+0x20/0x30
[   18.558940]  mempool_uaf_helper+0x314/0x340
[   18.558987]  mempool_kmalloc_uaf+0xc4/0x120
[   18.559034]  kunit_try_run_case+0x170/0x3f0
[   18.559084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.559137]  kthread+0x328/0x630
[   18.559181]  ret_from_fork+0x10/0x20
[   18.559230] 
[   18.559250] Allocated by task 227:
[   18.559280]  kasan_save_stack+0x3c/0x68
[   18.559323]  kasan_save_track+0x20/0x40
[   18.559362]  kasan_save_alloc_info+0x40/0x58
[   18.559403]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.559448]  remove_element+0x130/0x1f8
[   18.559486]  mempool_alloc_preallocated+0x58/0xc0
[   18.559526]  mempool_uaf_helper+0xa4/0x340
[   18.559563]  mempool_kmalloc_uaf+0xc4/0x120
[   18.559601]  kunit_try_run_case+0x170/0x3f0
[   18.559640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.559684]  kthread+0x328/0x630
[   18.559717]  ret_from_fork+0x10/0x20
[   18.559754] 
[   18.559774] Freed by task 227:
[   18.559801]  kasan_save_stack+0x3c/0x68
[   18.559837]  kasan_save_track+0x20/0x40
[   18.559874]  kasan_save_free_info+0x4c/0x78
[   18.559926]  __kasan_mempool_poison_object+0xc0/0x150
[   18.559967]  mempool_free+0x28c/0x328
[   18.560001]  mempool_uaf_helper+0x104/0x340
[   18.560040]  mempool_kmalloc_uaf+0xc4/0x120
[   18.560078]  kunit_try_run_case+0x170/0x3f0
[   18.560115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.560158]  kthread+0x328/0x630
[   18.560190]  ret_from_fork+0x10/0x20
[   18.560227] 
[   18.560246] The buggy address belongs to the object at fff00000c3eddd00
[   18.560246]  which belongs to the cache kmalloc-128 of size 128
[   18.560305] The buggy address is located 0 bytes inside of
[   18.560305]  freed 128-byte region [fff00000c3eddd00, fff00000c3eddd80)
[   18.560366] 
[   18.560387] The buggy address belongs to the physical page:
[   18.560421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103edd
[   18.560475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.560527] page_type: f5(slab)
[   18.560568] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.560621] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.560663] page dumped because: kasan: bad access detected
[   18.560696] 
[   18.560714] Memory state around the buggy address:
[   18.560745]  fff00000c3eddc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.560789]  fff00000c3eddc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.560832] >fff00000c3eddd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.560873]                    ^
[   18.560909]  fff00000c3eddd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.560953]  fff00000c3edde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.560991] ==================================================================
[   18.593453] ==================================================================
[   18.593527] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   18.593592] Read of size 1 at addr fff00000c780a240 by task kunit_try_catch/231
[   18.593650] 
[   18.593685] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.593816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.593867] Hardware name: linux,dummy-virt (DT)
[   18.594177] Call trace:
[   18.594218]  show_stack+0x20/0x38 (C)
[   18.594275]  dump_stack_lvl+0x8c/0xd0
[   18.594323]  print_report+0x118/0x5d0
[   18.594408]  kasan_report+0xdc/0x128
[   18.594491]  __asan_report_load1_noabort+0x20/0x30
[   18.594578]  mempool_uaf_helper+0x314/0x340
[   18.594683]  mempool_slab_uaf+0xc0/0x118
[   18.594999]  kunit_try_run_case+0x170/0x3f0
[   18.595453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.595551]  kthread+0x328/0x630
[   18.595684]  ret_from_fork+0x10/0x20
[   18.595783] 
[   18.595810] Allocated by task 231:
[   18.596159]  kasan_save_stack+0x3c/0x68
[   18.596231]  kasan_save_track+0x20/0x40
[   18.596479]  kasan_save_alloc_info+0x40/0x58
[   18.596618]  __kasan_mempool_unpoison_object+0xbc/0x180
[   18.596783]  remove_element+0x16c/0x1f8
[   18.596829]  mempool_alloc_preallocated+0x58/0xc0
[   18.597149]  mempool_uaf_helper+0xa4/0x340
[   18.597235]  mempool_slab_uaf+0xc0/0x118
[   18.597420]  kunit_try_run_case+0x170/0x3f0
[   18.597814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.597873]  kthread+0x328/0x630
[   18.597919]  ret_from_fork+0x10/0x20
[   18.598216] 
[   18.598549] Freed by task 231:
[   18.598625]  kasan_save_stack+0x3c/0x68
[   18.599016]  kasan_save_track+0x20/0x40
[   18.599243]  kasan_save_free_info+0x4c/0x78
[   18.599301]  __kasan_mempool_poison_object+0xc0/0x150
[   18.599400]  mempool_free+0x28c/0x328
[   18.599447]  mempool_uaf_helper+0x104/0x340
[   18.599494]  mempool_slab_uaf+0xc0/0x118
[   18.599532]  kunit_try_run_case+0x170/0x3f0
[   18.599580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.599625]  kthread+0x328/0x630
[   18.599659]  ret_from_fork+0x10/0x20
[   18.599695] 
[   18.599726] The buggy address belongs to the object at fff00000c780a240
[   18.599726]  which belongs to the cache test_cache of size 123
[   18.599797] The buggy address is located 0 bytes inside of
[   18.599797]  freed 123-byte region [fff00000c780a240, fff00000c780a2bb)
[   18.599859] 
[   18.599879] The buggy address belongs to the physical page:
[   18.599925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10780a
[   18.599987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.600050] page_type: f5(slab)
[   18.600105] raw: 0bfffe0000000000 fff00000c7882140 dead000000000122 0000000000000000
[   18.600177] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   18.600219] page dumped because: kasan: bad access detected
[   18.600250] 
[   18.600268] Memory state around the buggy address:
[   18.600317]  fff00000c780a100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.600369]  fff00000c780a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.600422] >fff00000c780a200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   18.600469]                                            ^
[   18.600508]  fff00000c780a280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.600550]  fff00000c780a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.600589] ==================================================================

[   18.674660] ==================================================================
[   18.674782] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   18.674853] Read of size 1 at addr fff00000c5b4c500 by task kunit_try_catch/227
[   18.674927] 
[   18.675001] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.675088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.675116] Hardware name: linux,dummy-virt (DT)
[   18.675159] Call trace:
[   18.675184]  show_stack+0x20/0x38 (C)
[   18.675240]  dump_stack_lvl+0x8c/0xd0
[   18.675292]  print_report+0x118/0x5d0
[   18.675355]  kasan_report+0xdc/0x128
[   18.675744]  __asan_report_load1_noabort+0x20/0x30
[   18.675835]  mempool_uaf_helper+0x314/0x340
[   18.675885]  mempool_kmalloc_uaf+0xc4/0x120
[   18.675932]  kunit_try_run_case+0x170/0x3f0
[   18.675983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.676036]  kthread+0x328/0x630
[   18.676137]  ret_from_fork+0x10/0x20
[   18.676192] 
[   18.676213] Allocated by task 227:
[   18.676304]  kasan_save_stack+0x3c/0x68
[   18.676365]  kasan_save_track+0x20/0x40
[   18.676404]  kasan_save_alloc_info+0x40/0x58
[   18.676450]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.676495]  remove_element+0x130/0x1f8
[   18.677013]  mempool_alloc_preallocated+0x58/0xc0
[   18.677185]  mempool_uaf_helper+0xa4/0x340
[   18.677613]  mempool_kmalloc_uaf+0xc4/0x120
[   18.677837]  kunit_try_run_case+0x170/0x3f0
[   18.677944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.678081]  kthread+0x328/0x630
[   18.678118]  ret_from_fork+0x10/0x20
[   18.678187] 
[   18.678389] Freed by task 227:
[   18.678466]  kasan_save_stack+0x3c/0x68
[   18.678659]  kasan_save_track+0x20/0x40
[   18.678714]  kasan_save_free_info+0x4c/0x78
[   18.678753]  __kasan_mempool_poison_object+0xc0/0x150
[   18.678795]  mempool_free+0x28c/0x328
[   18.678831]  mempool_uaf_helper+0x104/0x340
[   18.678868]  mempool_kmalloc_uaf+0xc4/0x120
[   18.678904]  kunit_try_run_case+0x170/0x3f0
[   18.678963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.679017]  kthread+0x328/0x630
[   18.679050]  ret_from_fork+0x10/0x20
[   18.679085] 
[   18.679116] The buggy address belongs to the object at fff00000c5b4c500
[   18.679116]  which belongs to the cache kmalloc-128 of size 128
[   18.679178] The buggy address is located 0 bytes inside of
[   18.679178]  freed 128-byte region [fff00000c5b4c500, fff00000c5b4c580)
[   18.679240] 
[   18.679268] The buggy address belongs to the physical page:
[   18.679328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b4c
[   18.679392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.679446] page_type: f5(slab)
[   18.679498] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.679549] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.679611] page dumped because: kasan: bad access detected
[   18.680097] 
[   18.680488] Memory state around the buggy address:
[   18.680562]  fff00000c5b4c400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.680798]  fff00000c5b4c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.680865] >fff00000c5b4c500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.681046]                    ^
[   18.681091]  fff00000c5b4c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.681150]  fff00000c5b4c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.681195] ==================================================================
[   18.744220] ==================================================================
[   18.744306] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   18.744374] Read of size 1 at addr fff00000c5b44240 by task kunit_try_catch/231
[   18.744427] 
[   18.744465] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.744554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.744580] Hardware name: linux,dummy-virt (DT)
[   18.744630] Call trace:
[   18.744656]  show_stack+0x20/0x38 (C)
[   18.744708]  dump_stack_lvl+0x8c/0xd0
[   18.744756]  print_report+0x118/0x5d0
[   18.744805]  kasan_report+0xdc/0x128
[   18.744852]  __asan_report_load1_noabort+0x20/0x30
[   18.744904]  mempool_uaf_helper+0x314/0x340
[   18.744960]  mempool_slab_uaf+0xc0/0x118
[   18.745005]  kunit_try_run_case+0x170/0x3f0
[   18.745055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.745109]  kthread+0x328/0x630
[   18.745151]  ret_from_fork+0x10/0x20
[   18.745200] 
[   18.745221] Allocated by task 231:
[   18.745250]  kasan_save_stack+0x3c/0x68
[   18.745292]  kasan_save_track+0x20/0x40
[   18.745331]  kasan_save_alloc_info+0x40/0x58
[   18.745371]  __kasan_mempool_unpoison_object+0xbc/0x180
[   18.745415]  remove_element+0x16c/0x1f8
[   18.745453]  mempool_alloc_preallocated+0x58/0xc0
[   18.745493]  mempool_uaf_helper+0xa4/0x340
[   18.745531]  mempool_slab_uaf+0xc0/0x118
[   18.745568]  kunit_try_run_case+0x170/0x3f0
[   18.745607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.746226]  kthread+0x328/0x630
[   18.746263]  ret_from_fork+0x10/0x20
[   18.746314] 
[   18.746334] Freed by task 231:
[   18.746365]  kasan_save_stack+0x3c/0x68
[   18.746418]  kasan_save_track+0x20/0x40
[   18.746467]  kasan_save_free_info+0x4c/0x78
[   18.746507]  __kasan_mempool_poison_object+0xc0/0x150
[   18.746552]  mempool_free+0x28c/0x328
[   18.746589]  mempool_uaf_helper+0x104/0x340
[   18.746637]  mempool_slab_uaf+0xc0/0x118
[   18.746677]  kunit_try_run_case+0x170/0x3f0
[   18.746716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.746760]  kthread+0x328/0x630
[   18.746794]  ret_from_fork+0x10/0x20
[   18.746832] 
[   18.746851] The buggy address belongs to the object at fff00000c5b44240
[   18.746851]  which belongs to the cache test_cache of size 123
[   18.746913] The buggy address is located 0 bytes inside of
[   18.746913]  freed 123-byte region [fff00000c5b44240, fff00000c5b442bb)
[   18.746977] 
[   18.746999] The buggy address belongs to the physical page:
[   18.747032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b44
[   18.747087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.747138] page_type: f5(slab)
[   18.747182] raw: 0bfffe0000000000 fff00000c6670780 dead000000000122 0000000000000000
[   18.747235] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   18.747277] page dumped because: kasan: bad access detected
[   18.747308] 
[   18.747327] Memory state around the buggy address:
[   18.747360]  fff00000c5b44100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.747405]  fff00000c5b44180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.747448] >fff00000c5b44200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   18.747487]                                            ^
[   18.747521]  fff00000c5b44280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.747563]  fff00000c5b44300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.747602] ==================================================================

[   14.245650] ==================================================================
[   14.246131] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   14.247103] Read of size 1 at addr ffff88810315c240 by task kunit_try_catch/249
[   14.247926] 
[   14.248109] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.248158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.248170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.248195] Call Trace:
[   14.248208]  <TASK>
[   14.248227]  dump_stack_lvl+0x73/0xb0
[   14.248258]  print_report+0xd1/0x610
[   14.248281]  ? __virt_addr_valid+0x1db/0x2d0
[   14.248306]  ? mempool_uaf_helper+0x392/0x400
[   14.248328]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.248351]  ? mempool_uaf_helper+0x392/0x400
[   14.248374]  kasan_report+0x141/0x180
[   14.248409]  ? mempool_uaf_helper+0x392/0x400
[   14.248438]  __asan_report_load1_noabort+0x18/0x20
[   14.248462]  mempool_uaf_helper+0x392/0x400
[   14.248485]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   14.248511]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.248535]  ? finish_task_switch.isra.0+0x153/0x700
[   14.248562]  mempool_slab_uaf+0xea/0x140
[   14.248585]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   14.248611]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   14.248637]  ? __pfx_mempool_free_slab+0x10/0x10
[   14.248663]  ? __pfx_read_tsc+0x10/0x10
[   14.248691]  ? ktime_get_ts64+0x86/0x230
[   14.248717]  kunit_try_run_case+0x1a5/0x480
[   14.248744]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.248767]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.248793]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.248817]  ? __kthread_parkme+0x82/0x180
[   14.248838]  ? preempt_count_sub+0x50/0x80
[   14.248862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.248887]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.248911]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.248936]  kthread+0x337/0x6f0
[   14.248956]  ? trace_preempt_on+0x20/0xc0
[   14.248982]  ? __pfx_kthread+0x10/0x10
[   14.249003]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.249067]  ? calculate_sigpending+0x7b/0xa0
[   14.249094]  ? __pfx_kthread+0x10/0x10
[   14.249116]  ret_from_fork+0x116/0x1d0
[   14.249147]  ? __pfx_kthread+0x10/0x10
[   14.249169]  ret_from_fork_asm+0x1a/0x30
[   14.249203]  </TASK>
[   14.249214] 
[   14.261728] Allocated by task 249:
[   14.261918]  kasan_save_stack+0x45/0x70
[   14.262454]  kasan_save_track+0x18/0x40
[   14.262658]  kasan_save_alloc_info+0x3b/0x50
[   14.262815]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   14.262993]  remove_element+0x11e/0x190
[   14.263136]  mempool_alloc_preallocated+0x4d/0x90
[   14.263297]  mempool_uaf_helper+0x96/0x400
[   14.263958]  mempool_slab_uaf+0xea/0x140
[   14.264374]  kunit_try_run_case+0x1a5/0x480
[   14.264884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.265315]  kthread+0x337/0x6f0
[   14.265515]  ret_from_fork+0x116/0x1d0
[   14.265697]  ret_from_fork_asm+0x1a/0x30
[   14.265876] 
[   14.265968] Freed by task 249:
[   14.266119]  kasan_save_stack+0x45/0x70
[   14.266300]  kasan_save_track+0x18/0x40
[   14.267014]  kasan_save_free_info+0x3f/0x60
[   14.267618]  __kasan_mempool_poison_object+0x131/0x1d0
[   14.268137]  mempool_free+0x2ec/0x380
[   14.268324]  mempool_uaf_helper+0x11a/0x400
[   14.268534]  mempool_slab_uaf+0xea/0x140
[   14.268963]  kunit_try_run_case+0x1a5/0x480
[   14.269379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.269801]  kthread+0x337/0x6f0
[   14.269973]  ret_from_fork+0x116/0x1d0
[   14.270336]  ret_from_fork_asm+0x1a/0x30
[   14.270700] 
[   14.270797] The buggy address belongs to the object at ffff88810315c240
[   14.270797]  which belongs to the cache test_cache of size 123
[   14.271597] The buggy address is located 0 bytes inside of
[   14.271597]  freed 123-byte region [ffff88810315c240, ffff88810315c2bb)
[   14.272274] 
[   14.272543] The buggy address belongs to the physical page:
[   14.272946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10315c
[   14.273422] flags: 0x200000000000000(node=0|zone=2)
[   14.273906] page_type: f5(slab)
[   14.274151] raw: 0200000000000000 ffff8881031533c0 dead000000000122 0000000000000000
[   14.274755] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   14.275526] page dumped because: kasan: bad access detected
[   14.276018] 
[   14.276304] Memory state around the buggy address:
[   14.276546]  ffff88810315c100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.277431]  ffff88810315c180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.278292] >ffff88810315c200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   14.278773]                                            ^
[   14.279013]  ffff88810315c280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.279974]  ffff88810315c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.280423] ==================================================================
[   14.182344] ==================================================================
[   14.182832] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   14.183243] Read of size 1 at addr ffff88810313af00 by task kunit_try_catch/245
[   14.183564] 
[   14.183700] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.183748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.183761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.183784] Call Trace:
[   14.183798]  <TASK>
[   14.183816]  dump_stack_lvl+0x73/0xb0
[   14.183849]  print_report+0xd1/0x610
[   14.183873]  ? __virt_addr_valid+0x1db/0x2d0
[   14.183897]  ? mempool_uaf_helper+0x392/0x400
[   14.183919]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.183942]  ? mempool_uaf_helper+0x392/0x400
[   14.183964]  kasan_report+0x141/0x180
[   14.183986]  ? mempool_uaf_helper+0x392/0x400
[   14.184073]  __asan_report_load1_noabort+0x18/0x20
[   14.184104]  mempool_uaf_helper+0x392/0x400
[   14.184128]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   14.184151]  ? kasan_save_track+0x18/0x40
[   14.184171]  ? kasan_save_alloc_info+0x3b/0x50
[   14.184194]  ? kasan_save_stack+0x45/0x70
[   14.184218]  mempool_kmalloc_uaf+0xef/0x140
[   14.184240]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   14.184266]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.184291]  ? __pfx_mempool_kfree+0x10/0x10
[   14.184316]  ? __pfx_read_tsc+0x10/0x10
[   14.184338]  ? ktime_get_ts64+0x86/0x230
[   14.184366]  kunit_try_run_case+0x1a5/0x480
[   14.184404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.184428]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.184452]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.184476]  ? __kthread_parkme+0x82/0x180
[   14.184497]  ? preempt_count_sub+0x50/0x80
[   14.184523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.184547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.184589]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.184613]  kthread+0x337/0x6f0
[   14.184634]  ? trace_preempt_on+0x20/0xc0
[   14.184658]  ? __pfx_kthread+0x10/0x10
[   14.184683]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.184704]  ? calculate_sigpending+0x7b/0xa0
[   14.184729]  ? __pfx_kthread+0x10/0x10
[   14.184751]  ret_from_fork+0x116/0x1d0
[   14.184771]  ? __pfx_kthread+0x10/0x10
[   14.184791]  ret_from_fork_asm+0x1a/0x30
[   14.184824]  </TASK>
[   14.184835] 
[   14.192907] Allocated by task 245:
[   14.193192]  kasan_save_stack+0x45/0x70
[   14.193414]  kasan_save_track+0x18/0x40
[   14.193609]  kasan_save_alloc_info+0x3b/0x50
[   14.193857]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.194188]  remove_element+0x11e/0x190
[   14.194389]  mempool_alloc_preallocated+0x4d/0x90
[   14.194636]  mempool_uaf_helper+0x96/0x400
[   14.194825]  mempool_kmalloc_uaf+0xef/0x140
[   14.195072]  kunit_try_run_case+0x1a5/0x480
[   14.195255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.195495]  kthread+0x337/0x6f0
[   14.195684]  ret_from_fork+0x116/0x1d0
[   14.195852]  ret_from_fork_asm+0x1a/0x30
[   14.195996] 
[   14.196128] Freed by task 245:
[   14.196244]  kasan_save_stack+0x45/0x70
[   14.196383]  kasan_save_track+0x18/0x40
[   14.196588]  kasan_save_free_info+0x3f/0x60
[   14.196824]  __kasan_mempool_poison_object+0x131/0x1d0
[   14.197131]  mempool_free+0x2ec/0x380
[   14.197322]  mempool_uaf_helper+0x11a/0x400
[   14.197536]  mempool_kmalloc_uaf+0xef/0x140
[   14.197766]  kunit_try_run_case+0x1a5/0x480
[   14.197973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.198278]  kthread+0x337/0x6f0
[   14.198474]  ret_from_fork+0x116/0x1d0
[   14.198651]  ret_from_fork_asm+0x1a/0x30
[   14.198854] 
[   14.198936] The buggy address belongs to the object at ffff88810313af00
[   14.198936]  which belongs to the cache kmalloc-128 of size 128
[   14.199494] The buggy address is located 0 bytes inside of
[   14.199494]  freed 128-byte region [ffff88810313af00, ffff88810313af80)
[   14.199976] 
[   14.200143] The buggy address belongs to the physical page:
[   14.200385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10313a
[   14.200753] flags: 0x200000000000000(node=0|zone=2)
[   14.200959] page_type: f5(slab)
[   14.201121] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.201490] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   14.201810] page dumped because: kasan: bad access detected
[   14.202123] 
[   14.202203] Memory state around the buggy address:
[   14.202363]  ffff88810313ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.202619]  ffff88810313ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.202943] >ffff88810313af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.203346]                    ^
[   14.203533]  ffff88810313af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.203813]  ffff88810313b000: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   14.204160] ==================================================================

[   14.272650] ==================================================================
[   14.274110] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   14.275196] Read of size 1 at addr ffff8881027bc200 by task kunit_try_catch/245
[   14.275976] 
[   14.276083] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.276134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.276158] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.276181] Call Trace:
[   14.276195]  <TASK>
[   14.276213]  dump_stack_lvl+0x73/0xb0
[   14.276244]  print_report+0xd1/0x610
[   14.276268]  ? __virt_addr_valid+0x1db/0x2d0
[   14.276291]  ? mempool_uaf_helper+0x392/0x400
[   14.276312]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.276339]  ? mempool_uaf_helper+0x392/0x400
[   14.276361]  kasan_report+0x141/0x180
[   14.276382]  ? mempool_uaf_helper+0x392/0x400
[   14.276408]  __asan_report_load1_noabort+0x18/0x20
[   14.276432]  mempool_uaf_helper+0x392/0x400
[   14.276454]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   14.276477]  ? __kasan_check_write+0x18/0x20
[   14.276496]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.276520]  ? finish_task_switch.isra.0+0x153/0x700
[   14.276548]  mempool_kmalloc_uaf+0xef/0x140
[   14.276572]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   14.276598]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.276621]  ? __pfx_mempool_kfree+0x10/0x10
[   14.276646]  ? __pfx_read_tsc+0x10/0x10
[   14.276668]  ? ktime_get_ts64+0x86/0x230
[   14.276694]  kunit_try_run_case+0x1a5/0x480
[   14.276719]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.276741]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.276764]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.276786]  ? __kthread_parkme+0x82/0x180
[   14.276809]  ? preempt_count_sub+0x50/0x80
[   14.276832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.276855]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.276879]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.276903]  kthread+0x337/0x6f0
[   14.276922]  ? trace_preempt_on+0x20/0xc0
[   14.276945]  ? __pfx_kthread+0x10/0x10
[   14.276965]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.276985]  ? calculate_sigpending+0x7b/0xa0
[   14.277010]  ? __pfx_kthread+0x10/0x10
[   14.277031]  ret_from_fork+0x116/0x1d0
[   14.277061]  ? __pfx_kthread+0x10/0x10
[   14.277081]  ret_from_fork_asm+0x1a/0x30
[   14.277113]  </TASK>
[   14.277134] 
[   14.289738] Allocated by task 245:
[   14.290102]  kasan_save_stack+0x45/0x70
[   14.290322]  kasan_save_track+0x18/0x40
[   14.290675]  kasan_save_alloc_info+0x3b/0x50
[   14.291013]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.291550]  remove_element+0x11e/0x190
[   14.291722]  mempool_alloc_preallocated+0x4d/0x90
[   14.292291]  mempool_uaf_helper+0x96/0x400
[   14.292642]  mempool_kmalloc_uaf+0xef/0x140
[   14.292845]  kunit_try_run_case+0x1a5/0x480
[   14.293324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.293528]  kthread+0x337/0x6f0
[   14.293838]  ret_from_fork+0x116/0x1d0
[   14.294029]  ret_from_fork_asm+0x1a/0x30
[   14.294502] 
[   14.294608] Freed by task 245:
[   14.295100]  kasan_save_stack+0x45/0x70
[   14.295321]  kasan_save_track+0x18/0x40
[   14.295727]  kasan_save_free_info+0x3f/0x60
[   14.296175]  __kasan_mempool_poison_object+0x131/0x1d0
[   14.296607]  mempool_free+0x2ec/0x380
[   14.296800]  mempool_uaf_helper+0x11a/0x400
[   14.297140]  mempool_kmalloc_uaf+0xef/0x140
[   14.297337]  kunit_try_run_case+0x1a5/0x480
[   14.297760]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.298269]  kthread+0x337/0x6f0
[   14.298470]  ret_from_fork+0x116/0x1d0
[   14.298653]  ret_from_fork_asm+0x1a/0x30
[   14.299128] 
[   14.299248] The buggy address belongs to the object at ffff8881027bc200
[   14.299248]  which belongs to the cache kmalloc-128 of size 128
[   14.300039] The buggy address is located 0 bytes inside of
[   14.300039]  freed 128-byte region [ffff8881027bc200, ffff8881027bc280)
[   14.300682] 
[   14.301003] The buggy address belongs to the physical page:
[   14.301427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027bc
[   14.301917] flags: 0x200000000000000(node=0|zone=2)
[   14.302162] page_type: f5(slab)
[   14.302432] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.302749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.303458] page dumped because: kasan: bad access detected
[   14.303660] 
[   14.303866] Memory state around the buggy address:
[   14.304337]  ffff8881027bc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.304762]  ffff8881027bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.305259] >ffff8881027bc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.305734]                    ^
[   14.305907]  ffff8881027bc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.306526]  ffff8881027bc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.307130] ==================================================================
[   14.343963] ==================================================================
[   14.344642] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   14.344987] Read of size 1 at addr ffff8881027c0240 by task kunit_try_catch/249
[   14.345275] 
[   14.345468] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.345518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.345530] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.345559] Call Trace:
[   14.345572]  <TASK>
[   14.345593]  dump_stack_lvl+0x73/0xb0
[   14.345625]  print_report+0xd1/0x610
[   14.345669]  ? __virt_addr_valid+0x1db/0x2d0
[   14.345695]  ? mempool_uaf_helper+0x392/0x400
[   14.345801]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.345826]  ? mempool_uaf_helper+0x392/0x400
[   14.345848]  kasan_report+0x141/0x180
[   14.345870]  ? mempool_uaf_helper+0x392/0x400
[   14.345896]  __asan_report_load1_noabort+0x18/0x20
[   14.345920]  mempool_uaf_helper+0x392/0x400
[   14.345953]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   14.345977]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.346001]  ? finish_task_switch.isra.0+0x153/0x700
[   14.346027]  mempool_slab_uaf+0xea/0x140
[   14.346201]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   14.346227]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   14.346253]  ? __pfx_mempool_free_slab+0x10/0x10
[   14.346279]  ? __pfx_read_tsc+0x10/0x10
[   14.346301]  ? ktime_get_ts64+0x86/0x230
[   14.346398]  kunit_try_run_case+0x1a5/0x480
[   14.346427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.346450]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.346475]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.346498]  ? __kthread_parkme+0x82/0x180
[   14.346519]  ? preempt_count_sub+0x50/0x80
[   14.346542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.346565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.346588]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.346612]  kthread+0x337/0x6f0
[   14.346631]  ? trace_preempt_on+0x20/0xc0
[   14.346655]  ? __pfx_kthread+0x10/0x10
[   14.346675]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.346697]  ? calculate_sigpending+0x7b/0xa0
[   14.346721]  ? __pfx_kthread+0x10/0x10
[   14.346743]  ret_from_fork+0x116/0x1d0
[   14.346762]  ? __pfx_kthread+0x10/0x10
[   14.346783]  ret_from_fork_asm+0x1a/0x30
[   14.346814]  </TASK>
[   14.346825] 
[   14.359533] Allocated by task 249:
[   14.359704]  kasan_save_stack+0x45/0x70
[   14.360366]  kasan_save_track+0x18/0x40
[   14.360659]  kasan_save_alloc_info+0x3b/0x50
[   14.361043]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   14.361315]  remove_element+0x11e/0x190
[   14.361494]  mempool_alloc_preallocated+0x4d/0x90
[   14.361700]  mempool_uaf_helper+0x96/0x400
[   14.362485]  mempool_slab_uaf+0xea/0x140
[   14.362912]  kunit_try_run_case+0x1a5/0x480
[   14.363256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.363668]  kthread+0x337/0x6f0
[   14.363837]  ret_from_fork+0x116/0x1d0
[   14.364263]  ret_from_fork_asm+0x1a/0x30
[   14.364752] 
[   14.365080] Freed by task 249:
[   14.365271]  kasan_save_stack+0x45/0x70
[   14.365611]  kasan_save_track+0x18/0x40
[   14.365796]  kasan_save_free_info+0x3f/0x60
[   14.366512]  __kasan_mempool_poison_object+0x131/0x1d0
[   14.366757]  mempool_free+0x2ec/0x380
[   14.367442]  mempool_uaf_helper+0x11a/0x400
[   14.367912]  mempool_slab_uaf+0xea/0x140
[   14.368116]  kunit_try_run_case+0x1a5/0x480
[   14.368570]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.369000]  kthread+0x337/0x6f0
[   14.369187]  ret_from_fork+0x116/0x1d0
[   14.369668]  ret_from_fork_asm+0x1a/0x30
[   14.370221] 
[   14.370337] The buggy address belongs to the object at ffff8881027c0240
[   14.370337]  which belongs to the cache test_cache of size 123
[   14.370813] The buggy address is located 0 bytes inside of
[   14.370813]  freed 123-byte region [ffff8881027c0240, ffff8881027c02bb)
[   14.372094] 
[   14.372207] The buggy address belongs to the physical page:
[   14.372641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c0
[   14.373276] flags: 0x200000000000000(node=0|zone=2)
[   14.373636] page_type: f5(slab)
[   14.373802] raw: 0200000000000000 ffff8881027b6140 dead000000000122 0000000000000000
[   14.374684] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   14.375359] page dumped because: kasan: bad access detected
[   14.375671] 
[   14.375911] Memory state around the buggy address:
[   14.376445]  ffff8881027c0100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.376757]  ffff8881027c0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.377342] >ffff8881027c0200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   14.378071]                                            ^
[   14.378349]  ffff8881027c0280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.378647]  ffff8881027c0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.379455] ==================================================================