Hay
Date
July 20, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.575552] ==================================================================
[   18.575955] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   18.576082] Read of size 1 at addr fff00000c798c000 by task kunit_try_catch/229
[   18.576489] 
[   18.576547] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.576959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.577032] Hardware name: linux,dummy-virt (DT)
[   18.577066] Call trace:
[   18.577329]  show_stack+0x20/0x38 (C)
[   18.577648]  dump_stack_lvl+0x8c/0xd0
[   18.577756]  print_report+0x118/0x5d0
[   18.577868]  kasan_report+0xdc/0x128
[   18.577927]  __asan_report_load1_noabort+0x20/0x30
[   18.578385]  mempool_uaf_helper+0x314/0x340
[   18.578552]  mempool_kmalloc_large_uaf+0xc4/0x120
[   18.578638]  kunit_try_run_case+0x170/0x3f0
[   18.579007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.579104]  kthread+0x328/0x630
[   18.579522]  ret_from_fork+0x10/0x20
[   18.579652] 
[   18.579774] The buggy address belongs to the physical page:
[   18.580090] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10798c
[   18.580162] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.580265] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.580395] page_type: f8(unknown)
[   18.580756] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.580861] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.580956] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.581054] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.581168] head: 0bfffe0000000002 ffffc1ffc31e6301 00000000ffffffff 00000000ffffffff
[   18.581538] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.581596] page dumped because: kasan: bad access detected
[   18.581638] 
[   18.581657] Memory state around the buggy address:
[   18.581692]  fff00000c798bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.581758]  fff00000c798bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.581952] >fff00000c798c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.582288]                    ^
[   18.582478]  fff00000c798c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.582537]  fff00000c798c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.582578] ==================================================================
[   18.632666] ==================================================================
[   18.632732] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   18.633106] Read of size 1 at addr fff00000c7990000 by task kunit_try_catch/233
[   18.633232] 
[   18.633357] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.633450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.633476] Hardware name: linux,dummy-virt (DT)
[   18.633526] Call trace:
[   18.633551]  show_stack+0x20/0x38 (C)
[   18.633604]  dump_stack_lvl+0x8c/0xd0
[   18.633826]  print_report+0x118/0x5d0
[   18.634054]  kasan_report+0xdc/0x128
[   18.634241]  __asan_report_load1_noabort+0x20/0x30
[   18.634765]  mempool_uaf_helper+0x314/0x340
[   18.635054]  mempool_page_alloc_uaf+0xc0/0x118
[   18.635237]  kunit_try_run_case+0x170/0x3f0
[   18.635514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.635581]  kthread+0x328/0x630
[   18.635625]  ret_from_fork+0x10/0x20
[   18.635700] 
[   18.635723] The buggy address belongs to the physical page:
[   18.635766] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107990
[   18.635835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.635915] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.635968] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.636009] page dumped because: kasan: bad access detected
[   18.636042] 
[   18.636060] Memory state around the buggy address:
[   18.636104]  fff00000c798ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.636150]  fff00000c798ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.636196] >fff00000c7990000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.636235]                    ^
[   18.636274]  fff00000c7990080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.636316]  fff00000c7990100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.636370] ==================================================================

[   18.692602] ==================================================================
[   18.692710] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   18.692777] Read of size 1 at addr fff00000c79b8000 by task kunit_try_catch/229
[   18.692829] 
[   18.692965] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.693062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.693090] Hardware name: linux,dummy-virt (DT)
[   18.693853] Call trace:
[   18.694415]  show_stack+0x20/0x38 (C)
[   18.694766]  dump_stack_lvl+0x8c/0xd0
[   18.695197]  print_report+0x118/0x5d0
[   18.695731]  kasan_report+0xdc/0x128
[   18.696134]  __asan_report_load1_noabort+0x20/0x30
[   18.696544]  mempool_uaf_helper+0x314/0x340
[   18.696798]  mempool_kmalloc_large_uaf+0xc4/0x120
[   18.697132]  kunit_try_run_case+0x170/0x3f0
[   18.697216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.697280]  kthread+0x328/0x630
[   18.697677]  ret_from_fork+0x10/0x20
[   18.697800] 
[   18.697853] The buggy address belongs to the physical page:
[   18.697889] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8
[   18.698095] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.698298] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.698492] page_type: f8(unknown)
[   18.698568] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.698925] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.698994] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.699046] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.699491] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff
[   18.699716] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.699876] page dumped because: kasan: bad access detected
[   18.700129] 
[   18.700155] Memory state around the buggy address:
[   18.700591]  fff00000c79b7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.700971]  fff00000c79b7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.701175] >fff00000c79b8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.701444]                    ^
[   18.701635]  fff00000c79b8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.701711]  fff00000c79b8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.701778] ==================================================================
[   18.788816] ==================================================================
[   18.788890] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   18.789075] Read of size 1 at addr fff00000c79e8000 by task kunit_try_catch/233
[   18.789129] 
[   18.789173] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.789259] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.789287] Hardware name: linux,dummy-virt (DT)
[   18.789322] Call trace:
[   18.789347]  show_stack+0x20/0x38 (C)
[   18.789398]  dump_stack_lvl+0x8c/0xd0
[   18.789450]  print_report+0x118/0x5d0
[   18.789496]  kasan_report+0xdc/0x128
[   18.789542]  __asan_report_load1_noabort+0x20/0x30
[   18.789594]  mempool_uaf_helper+0x314/0x340
[   18.789656]  mempool_page_alloc_uaf+0xc0/0x118
[   18.789702]  kunit_try_run_case+0x170/0x3f0
[   18.789753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.789806]  kthread+0x328/0x630
[   18.789848]  ret_from_fork+0x10/0x20
[   18.789903] 
[   18.789928] The buggy address belongs to the physical page:
[   18.789961] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e8
[   18.790018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.790089] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.790142] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.790184] page dumped because: kasan: bad access detected
[   18.790216] 
[   18.790234] Memory state around the buggy address:
[   18.790268]  fff00000c79e7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.790313]  fff00000c79e7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.790357] >fff00000c79e8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.790397]                    ^
[   18.790424]  fff00000c79e8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.790466]  fff00000c79e8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.790505] ==================================================================

[   14.208645] ==================================================================
[   14.209320] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   14.209566] Read of size 1 at addr ffff888103920000 by task kunit_try_catch/247
[   14.209795] 
[   14.209888] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.209936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.209948] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.209971] Call Trace:
[   14.209983]  <TASK>
[   14.210001]  dump_stack_lvl+0x73/0xb0
[   14.210032]  print_report+0xd1/0x610
[   14.210055]  ? __virt_addr_valid+0x1db/0x2d0
[   14.210089]  ? mempool_uaf_helper+0x392/0x400
[   14.210111]  ? kasan_addr_to_slab+0x11/0xa0
[   14.210132]  ? mempool_uaf_helper+0x392/0x400
[   14.210155]  kasan_report+0x141/0x180
[   14.210178]  ? mempool_uaf_helper+0x392/0x400
[   14.210206]  __asan_report_load1_noabort+0x18/0x20
[   14.210231]  mempool_uaf_helper+0x392/0x400
[   14.210255]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   14.210277]  ? update_load_avg+0x1be/0x21b0
[   14.210307]  ? finish_task_switch.isra.0+0x153/0x700
[   14.210333]  mempool_kmalloc_large_uaf+0xef/0x140
[   14.210357]  ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10
[   14.211051]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.211088]  ? __pfx_mempool_kfree+0x10/0x10
[   14.211115]  ? __pfx_read_tsc+0x10/0x10
[   14.211136]  ? ktime_get_ts64+0x86/0x230
[   14.211164]  kunit_try_run_case+0x1a5/0x480
[   14.211190]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.211213]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.211237]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.211261]  ? __kthread_parkme+0x82/0x180
[   14.211282]  ? preempt_count_sub+0x50/0x80
[   14.211305]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.211329]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.211353]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.211377]  kthread+0x337/0x6f0
[   14.211406]  ? trace_preempt_on+0x20/0xc0
[   14.211430]  ? __pfx_kthread+0x10/0x10
[   14.211451]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.211472]  ? calculate_sigpending+0x7b/0xa0
[   14.211496]  ? __pfx_kthread+0x10/0x10
[   14.211519]  ret_from_fork+0x116/0x1d0
[   14.211538]  ? __pfx_kthread+0x10/0x10
[   14.211560]  ret_from_fork_asm+0x1a/0x30
[   14.211592]  </TASK>
[   14.211603] 
[   14.231482] The buggy address belongs to the physical page:
[   14.232268] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103920
[   14.232901] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.233503] flags: 0x200000000000040(head|node=0|zone=2)
[   14.234178] page_type: f8(unknown)
[   14.234554] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.234893] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.235204] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.235525] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.235843] head: 0200000000000002 ffffea00040e4801 00000000ffffffff 00000000ffffffff
[   14.236168] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.236897] page dumped because: kasan: bad access detected
[   14.237598] 
[   14.237833] Memory state around the buggy address:
[   14.238311]  ffff88810391ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.238779]  ffff88810391ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.239377] >ffff888103920000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.239849]                    ^
[   14.240327]  ffff888103920080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.240909]  ffff888103920100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.241654] ==================================================================
[   14.288866] ==================================================================
[   14.289550] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   14.290688] Read of size 1 at addr ffff888103920000 by task kunit_try_catch/251
[   14.291813] 
[   14.292087] CPU: 1 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.292140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.292153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.292176] Call Trace:
[   14.292190]  <TASK>
[   14.292208]  dump_stack_lvl+0x73/0xb0
[   14.292240]  print_report+0xd1/0x610
[   14.292263]  ? __virt_addr_valid+0x1db/0x2d0
[   14.292288]  ? mempool_uaf_helper+0x392/0x400
[   14.292310]  ? kasan_addr_to_slab+0x11/0xa0
[   14.292330]  ? mempool_uaf_helper+0x392/0x400
[   14.292353]  kasan_report+0x141/0x180
[   14.292375]  ? mempool_uaf_helper+0x392/0x400
[   14.292414]  __asan_report_load1_noabort+0x18/0x20
[   14.292439]  mempool_uaf_helper+0x392/0x400
[   14.292462]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   14.292486]  ? __kasan_check_write+0x18/0x20
[   14.292506]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.292575]  ? finish_task_switch.isra.0+0x153/0x700
[   14.292604]  mempool_page_alloc_uaf+0xed/0x140
[   14.292641]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   14.292694]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   14.292721]  ? __pfx_mempool_free_pages+0x10/0x10
[   14.292748]  ? __pfx_read_tsc+0x10/0x10
[   14.292769]  ? ktime_get_ts64+0x86/0x230
[   14.292796]  kunit_try_run_case+0x1a5/0x480
[   14.292821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.292843]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.292867]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.292890]  ? __kthread_parkme+0x82/0x180
[   14.292911]  ? preempt_count_sub+0x50/0x80
[   14.292934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.292959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.292982]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.293005]  kthread+0x337/0x6f0
[   14.293038]  ? trace_preempt_on+0x20/0xc0
[   14.293062]  ? __pfx_kthread+0x10/0x10
[   14.293083]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.293103]  ? calculate_sigpending+0x7b/0xa0
[   14.293128]  ? __pfx_kthread+0x10/0x10
[   14.293150]  ret_from_fork+0x116/0x1d0
[   14.293169]  ? __pfx_kthread+0x10/0x10
[   14.293190]  ret_from_fork_asm+0x1a/0x30
[   14.293222]  </TASK>
[   14.293233] 
[   14.307796] The buggy address belongs to the physical page:
[   14.307986] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103920
[   14.308952] flags: 0x200000000000000(node=0|zone=2)
[   14.309543] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   14.310001] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   14.310728] page dumped because: kasan: bad access detected
[   14.310902] 
[   14.310973] Memory state around the buggy address:
[   14.311425]  ffff88810391ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.312166]  ffff88810391ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.312893] >ffff888103920000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.313374]                    ^
[   14.313780]  ffff888103920080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.314254]  ffff888103920100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.314482] ==================================================================

[   14.310943] ==================================================================
[   14.311620] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   14.311869] Read of size 1 at addr ffff8881038c0000 by task kunit_try_catch/247
[   14.312105] 
[   14.312212] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.312262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.312276] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.312300] Call Trace:
[   14.312313]  <TASK>
[   14.312337]  dump_stack_lvl+0x73/0xb0
[   14.312370]  print_report+0xd1/0x610
[   14.312393]  ? __virt_addr_valid+0x1db/0x2d0
[   14.312419]  ? mempool_uaf_helper+0x392/0x400
[   14.312440]  ? kasan_addr_to_slab+0x11/0xa0
[   14.312461]  ? mempool_uaf_helper+0x392/0x400
[   14.312483]  kasan_report+0x141/0x180
[   14.312504]  ? mempool_uaf_helper+0x392/0x400
[   14.312530]  __asan_report_load1_noabort+0x18/0x20
[   14.312554]  mempool_uaf_helper+0x392/0x400
[   14.312577]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   14.312600]  ? __kasan_check_write+0x18/0x20
[   14.312618]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.312642]  ? finish_task_switch.isra.0+0x153/0x700
[   14.312668]  mempool_kmalloc_large_uaf+0xef/0x140
[   14.312691]  ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10
[   14.312717]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.312741]  ? __pfx_mempool_kfree+0x10/0x10
[   14.312766]  ? __pfx_read_tsc+0x10/0x10
[   14.312788]  ? ktime_get_ts64+0x86/0x230
[   14.312813]  kunit_try_run_case+0x1a5/0x480
[   14.312840]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.312862]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.312887]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.312910]  ? __kthread_parkme+0x82/0x180
[   14.312931]  ? preempt_count_sub+0x50/0x80
[   14.312954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.312978]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.313000]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.313024]  kthread+0x337/0x6f0
[   14.313043]  ? trace_preempt_on+0x20/0xc0
[   14.313067]  ? __pfx_kthread+0x10/0x10
[   14.313087]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.313108]  ? calculate_sigpending+0x7b/0xa0
[   14.313133]  ? __pfx_kthread+0x10/0x10
[   14.313190]  ret_from_fork+0x116/0x1d0
[   14.313210]  ? __pfx_kthread+0x10/0x10
[   14.313230]  ret_from_fork_asm+0x1a/0x30
[   14.313262]  </TASK>
[   14.313273] 
[   14.331742] The buggy address belongs to the physical page:
[   14.331955] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038c0
[   14.332231] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.332567] flags: 0x200000000000040(head|node=0|zone=2)
[   14.332780] page_type: f8(unknown)
[   14.332961] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.333380] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.333690] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.334087] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.334439] head: 0200000000000002 ffffea00040e3001 00000000ffffffff 00000000ffffffff
[   14.334747] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.335110] page dumped because: kasan: bad access detected
[   14.335405] 
[   14.335488] Memory state around the buggy address:
[   14.335707]  ffff8881038bff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.336049]  ffff8881038bff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.336365] >ffff8881038c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.336683]                    ^
[   14.336916]  ffff8881038c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.337212]  ffff8881038c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.337515] ==================================================================
[   14.387621] ==================================================================
[   14.388665] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   14.389168] Read of size 1 at addr ffff8881038c0000 by task kunit_try_catch/251
[   14.389936] 
[   14.390142] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.390203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.390217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.390240] Call Trace:
[   14.390256]  <TASK>
[   14.390275]  dump_stack_lvl+0x73/0xb0
[   14.390329]  print_report+0xd1/0x610
[   14.390353]  ? __virt_addr_valid+0x1db/0x2d0
[   14.390379]  ? mempool_uaf_helper+0x392/0x400
[   14.390400]  ? kasan_addr_to_slab+0x11/0xa0
[   14.390421]  ? mempool_uaf_helper+0x392/0x400
[   14.390443]  kasan_report+0x141/0x180
[   14.390464]  ? mempool_uaf_helper+0x392/0x400
[   14.390491]  __asan_report_load1_noabort+0x18/0x20
[   14.390515]  mempool_uaf_helper+0x392/0x400
[   14.390537]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   14.390560]  ? __kasan_check_write+0x18/0x20
[   14.390579]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.390602]  ? finish_task_switch.isra.0+0x153/0x700
[   14.390629]  mempool_page_alloc_uaf+0xed/0x140
[   14.390652]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   14.390678]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   14.390703]  ? __pfx_mempool_free_pages+0x10/0x10
[   14.390728]  ? __pfx_read_tsc+0x10/0x10
[   14.390749]  ? ktime_get_ts64+0x86/0x230
[   14.390773]  kunit_try_run_case+0x1a5/0x480
[   14.390802]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.390825]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.390856]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.390879]  ? __kthread_parkme+0x82/0x180
[   14.390900]  ? preempt_count_sub+0x50/0x80
[   14.390924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.390948]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.390971]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.390994]  kthread+0x337/0x6f0
[   14.391014]  ? trace_preempt_on+0x20/0xc0
[   14.391037]  ? __pfx_kthread+0x10/0x10
[   14.391058]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.391078]  ? calculate_sigpending+0x7b/0xa0
[   14.391103]  ? __pfx_kthread+0x10/0x10
[   14.391124]  ret_from_fork+0x116/0x1d0
[   14.391142]  ? __pfx_kthread+0x10/0x10
[   14.391170]  ret_from_fork_asm+0x1a/0x30
[   14.391200]  </TASK>
[   14.391211] 
[   14.405780] The buggy address belongs to the physical page:
[   14.406111] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038c0
[   14.406960] flags: 0x200000000000000(node=0|zone=2)
[   14.407505] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   14.408103] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   14.408595] page dumped because: kasan: bad access detected
[   14.409104] 
[   14.409216] Memory state around the buggy address:
[   14.409712]  ffff8881038bff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.410193]  ffff8881038bff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.410545] >ffff8881038c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.410782]                    ^
[   14.410946]  ffff8881038c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.411648]  ffff8881038c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.412425] ==================================================================