Hay
Date
Nov. 26, 2024, 6:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   33.751865] ==================================================================
[   33.753082] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   33.754012] Read of size 1 at addr fff00000c65e0000 by task kunit_try_catch/222
[   33.754890] 
[   33.755315] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   33.756585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.757213] Hardware name: linux,dummy-virt (DT)
[   33.757949] Call trace:
[   33.758378]  show_stack+0x20/0x38 (C)
[   33.759124]  dump_stack_lvl+0x8c/0xd0
[   33.759699]  print_report+0x118/0x5e0
[   33.760270]  kasan_report+0xc8/0x118
[   33.760894]  __asan_report_load1_noabort+0x20/0x30
[   33.761760]  mempool_uaf_helper+0x314/0x340
[   33.762394]  mempool_page_alloc_uaf+0xb8/0x118
[   33.763148]  kunit_try_run_case+0x14c/0x3d0
[   33.763842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.764635]  kthread+0x24c/0x2d0
[   33.765141]  ret_from_fork+0x10/0x20
[   33.765652] 
[   33.766048] The buggy address belongs to the physical page:
[   33.766712] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065e0
[   33.767793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.768676] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.769573] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.770416] page dumped because: kasan: bad access detected
[   33.771211] 
[   33.771636] Memory state around the buggy address:
[   33.772339]  fff00000c65dff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.773219]  fff00000c65dff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.774120] >fff00000c65e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.774987]                    ^
[   33.775556]  fff00000c65e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.776430]  fff00000c65e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.777196] ==================================================================
[   33.630377] ==================================================================
[   33.631396] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   33.632117] Read of size 1 at addr fff00000c65e0000 by task kunit_try_catch/218
[   33.633648] 
[   33.633936] CPU: 0 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   33.634810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.635469] Hardware name: linux,dummy-virt (DT)
[   33.636080] Call trace:
[   33.636885]  show_stack+0x20/0x38 (C)
[   33.637407]  dump_stack_lvl+0x8c/0xd0
[   33.638115]  print_report+0x118/0x5e0
[   33.638787]  kasan_report+0xc8/0x118
[   33.639488]  __asan_report_load1_noabort+0x20/0x30
[   33.640346]  mempool_uaf_helper+0x314/0x340
[   33.641261]  mempool_kmalloc_large_uaf+0xbc/0x118
[   33.641975]  kunit_try_run_case+0x14c/0x3d0
[   33.642663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.643450]  kthread+0x24c/0x2d0
[   33.644060]  ret_from_fork+0x10/0x20
[   33.644891] 
[   33.645260] The buggy address belongs to the physical page:
[   33.645857] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065e0
[   33.646872] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.648005] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.649265] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.650335] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.651410] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.652713] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.653563] head: 0bfffe0000000002 ffffc1ffc3197801 ffffffffffffffff 0000000000000000
[   33.654393] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   33.655980] page dumped because: kasan: bad access detected
[   33.657483] 
[   33.657715] Memory state around the buggy address:
[   33.658394]  fff00000c65dff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.659255]  fff00000c65dff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.660019] >fff00000c65e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.661324]                    ^
[   33.661759]  fff00000c65e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.662934]  fff00000c65e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.663960] ==================================================================

[   33.654899] ==================================================================
[   33.656880] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   33.658092] Read of size 1 at addr fff00000c6588000 by task kunit_try_catch/218
[   33.658998] 
[   33.659443] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   33.660549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.661220] Hardware name: linux,dummy-virt (DT)
[   33.661919] Call trace:
[   33.662614]  show_stack+0x20/0x38 (C)
[   33.663371]  dump_stack_lvl+0x8c/0xd0
[   33.664162]  print_report+0x118/0x5e0
[   33.664991]  kasan_report+0xc8/0x118
[   33.665870]  __asan_report_load1_noabort+0x20/0x30
[   33.666246]  mempool_uaf_helper+0x314/0x340
[   33.666553]  mempool_kmalloc_large_uaf+0xbc/0x118
[   33.666856]  kunit_try_run_case+0x14c/0x3d0
[   33.667142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.667463]  kthread+0x24c/0x2d0
[   33.668622]  ret_from_fork+0x10/0x20
[   33.669362] 
[   33.670065] The buggy address belongs to the physical page:
[   33.671092] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106588
[   33.672215] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.673324] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.674617] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.675597] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.676579] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.677419] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.678179] head: 0bfffe0000000002 ffffc1ffc3196201 ffffffffffffffff 0000000000000000
[   33.679172] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   33.680643] page dumped because: kasan: bad access detected
[   33.681261] 
[   33.681593] Memory state around the buggy address:
[   33.682277]  fff00000c6587f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.683068]  fff00000c6587f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.684236] >fff00000c6588000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.685009]                    ^
[   33.685568]  fff00000c6588080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.686700]  fff00000c6588100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.687475] ==================================================================
[   33.774867] ==================================================================
[   33.776150] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   33.776770] Read of size 1 at addr fff00000c662c000 by task kunit_try_catch/222
[   33.777704] 
[   33.778040] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   33.779239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.779864] Hardware name: linux,dummy-virt (DT)
[   33.780486] Call trace:
[   33.780959]  show_stack+0x20/0x38 (C)
[   33.781616]  dump_stack_lvl+0x8c/0xd0
[   33.782117]  print_report+0x118/0x5e0
[   33.782772]  kasan_report+0xc8/0x118
[   33.783388]  __asan_report_load1_noabort+0x20/0x30
[   33.784015]  mempool_uaf_helper+0x314/0x340
[   33.784693]  mempool_page_alloc_uaf+0xb8/0x118
[   33.785394]  kunit_try_run_case+0x14c/0x3d0
[   33.786019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.786730]  kthread+0x24c/0x2d0
[   33.787327]  ret_from_fork+0x10/0x20
[   33.787976] 
[   33.788359] The buggy address belongs to the physical page:
[   33.789048] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662c
[   33.789952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.790773] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.791752] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.792653] page dumped because: kasan: bad access detected
[   33.793263] 
[   33.793649] Memory state around the buggy address:
[   33.794285]  fff00000c662bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.795092]  fff00000c662bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.795971] >fff00000c662c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.796764]                    ^
[   33.797308]  fff00000c662c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.798077]  fff00000c662c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.798889] ==================================================================

[   27.877756] ==================================================================
[   27.878156] BUG: KASAN: use-after-free in mempool_uaf_helper+0x394/0x400
[   27.878156] Read of size 1 at addr ffff888102b24000 by task kunit_try_catch/242
[   27.878156] 
[   27.878156] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   27.878156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.878156] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.878156] Call Trace:
[   27.878156]  <TASK>
[   27.878156]  dump_stack_lvl+0x73/0xb0
[   27.878156]  print_report+0xd1/0x640
[   27.878156]  ? __virt_addr_valid+0x1db/0x2d0
[   27.878156]  ? kasan_addr_to_slab+0x11/0xa0
[   27.878156]  kasan_report+0x102/0x140
[   27.878156]  ? mempool_uaf_helper+0x394/0x400
[   27.878156]  ? mempool_uaf_helper+0x394/0x400
[   27.878156]  __asan_report_load1_noabort+0x18/0x20
[   27.878156]  mempool_uaf_helper+0x394/0x400
[   27.878156]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   27.878156]  ? read_hpet+0x1f0/0x230
[   27.878156]  ? ktime_get_ts64+0x84/0x230
[   27.878156]  ? trace_hardirqs_on+0x37/0xe0
[   27.878156]  mempool_page_alloc_uaf+0xb1/0x100
[   27.878156]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   27.878156]  ? __switch_to+0x5d9/0xf60
[   27.878156]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   27.878156]  ? __pfx_mempool_free_pages+0x10/0x10
[   27.878156]  ? ktime_get_ts64+0x84/0x230
[   27.878156]  kunit_try_run_case+0x1b3/0x490
[   27.878156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.878156]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.878156]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.878156]  ? __kthread_parkme+0x82/0x160
[   27.878156]  ? preempt_count_sub+0x50/0x80
[   27.878156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.878156]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.878156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.878156]  kthread+0x257/0x310
[   27.878156]  ? __pfx_kthread+0x10/0x10
[   27.878156]  ret_from_fork+0x41/0x80
[   27.878156]  ? __pfx_kthread+0x10/0x10
[   27.878156]  ret_from_fork_asm+0x1a/0x30
[   27.878156]  </TASK>
[   27.878156] 
[   27.878156] The buggy address belongs to the physical page:
[   27.878156] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b24
[   27.878156] flags: 0x200000000000000(node=0|zone=2)
[   27.878156] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   27.878156] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.878156] page dumped because: kasan: bad access detected
[   27.878156] 
[   27.878156] Memory state around the buggy address:
[   27.878156]  ffff888102b23f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.878156]  ffff888102b23f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.878156] >ffff888102b24000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.878156]                    ^
[   27.878156]  ffff888102b24080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.878156]  ffff888102b24100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.878156] ==================================================================
[   27.756984] ==================================================================
[   27.757660] BUG: KASAN: use-after-free in mempool_uaf_helper+0x394/0x400
[   27.757660] Read of size 1 at addr ffff888102b24000 by task kunit_try_catch/238
[   27.757660] 
[   27.757660] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   27.757660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.757660] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.757660] Call Trace:
[   27.757660]  <TASK>
[   27.757660]  dump_stack_lvl+0x73/0xb0
[   27.757660]  print_report+0xd1/0x640
[   27.757660]  ? __virt_addr_valid+0x1db/0x2d0
[   27.757660]  ? kasan_addr_to_slab+0x11/0xa0
[   27.757660]  kasan_report+0x102/0x140
[   27.757660]  ? mempool_uaf_helper+0x394/0x400
[   27.757660]  ? mempool_uaf_helper+0x394/0x400
[   27.757660]  __asan_report_load1_noabort+0x18/0x20
[   27.757660]  mempool_uaf_helper+0x394/0x400
[   27.757660]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   27.757660]  ? read_hpet+0x1f0/0x230
[   27.757660]  ? ktime_get_ts64+0x84/0x230
[   27.757660]  ? trace_hardirqs_on+0x37/0xe0
[   27.757660]  mempool_kmalloc_large_uaf+0xb3/0x100
[   27.757660]  ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10
[   27.757660]  ? __switch_to+0x5d9/0xf60
[   27.757660]  ? __pfx_mempool_kmalloc+0x10/0x10
[   27.757660]  ? __pfx_mempool_kfree+0x10/0x10
[   27.757660]  ? ktime_get_ts64+0x84/0x230
[   27.757660]  kunit_try_run_case+0x1b3/0x490
[   27.757660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.757660]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.757660]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.757660]  ? __kthread_parkme+0x82/0x160
[   27.757660]  ? preempt_count_sub+0x50/0x80
[   27.757660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.757660]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.757660]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.757660]  kthread+0x257/0x310
[   27.757660]  ? __pfx_kthread+0x10/0x10
[   27.757660]  ret_from_fork+0x41/0x80
[   27.757660]  ? __pfx_kthread+0x10/0x10
[   27.757660]  ret_from_fork_asm+0x1a/0x30
[   27.757660]  </TASK>
[   27.757660] 
[   27.757660] The buggy address belongs to the physical page:
[   27.757660] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b24
[   27.757660] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.757660] flags: 0x200000000000040(head|node=0|zone=2)
[   27.757660] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.757660] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.757660] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.757660] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.757660] head: 0200000000000002 ffffea00040ac901 ffffffffffffffff 0000000000000000
[   27.757660] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   27.757660] page dumped because: kasan: bad access detected
[   27.757660] 
[   27.757660] Memory state around the buggy address:
[   27.757660]  ffff888102b23f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.757660]  ffff888102b23f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.757660] >ffff888102b24000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.757660]                    ^
[   27.757660]  ffff888102b24080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.757660]  ffff888102b24100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.757660] ==================================================================

[   22.813394] ==================================================================
[   22.814112] BUG: KASAN: use-after-free in mempool_uaf_helper+0x394/0x400
[   22.815441] Read of size 1 at addr ffff888102ad8000 by task kunit_try_catch/240
[   22.816561] 
[   22.816775] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   22.818071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.818502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.819523] Call Trace:
[   22.820010]  <TASK>
[   22.820528]  dump_stack_lvl+0x73/0xb0
[   22.821266]  print_report+0xd1/0x640
[   22.821662]  ? __virt_addr_valid+0x1db/0x2d0
[   22.822099]  ? kasan_addr_to_slab+0x11/0xa0
[   22.822600]  kasan_report+0x102/0x140
[   22.823033]  ? mempool_uaf_helper+0x394/0x400
[   22.823606]  ? mempool_uaf_helper+0x394/0x400
[   22.824018]  __asan_report_load1_noabort+0x18/0x20
[   22.824349]  mempool_uaf_helper+0x394/0x400
[   22.824737]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   22.825290]  ? update_curr+0x7d/0x5a0
[   22.825672]  mempool_page_alloc_uaf+0xb1/0x100
[   22.826170]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   22.826560]  ? schedule+0x7c/0x310
[   22.826996]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   22.827321]  ? __pfx_mempool_free_pages+0x10/0x10
[   22.827878]  ? __pfx_read_tsc+0x10/0x10
[   22.828239]  ? ktime_get_ts64+0x84/0x230
[   22.828741]  kunit_try_run_case+0x1b3/0x490
[   22.829123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.829642]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.830120]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.830467]  ? __kthread_parkme+0x82/0x160
[   22.830980]  ? preempt_count_sub+0x50/0x80
[   22.831370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.831770]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.832137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.832620]  kthread+0x257/0x310
[   22.833020]  ? __pfx_kthread+0x10/0x10
[   22.833447]  ret_from_fork+0x41/0x80
[   22.833926]  ? __pfx_kthread+0x10/0x10
[   22.834335]  ret_from_fork_asm+0x1a/0x30
[   22.834870]  </TASK>
[   22.835099] 
[   22.835378] The buggy address belongs to the physical page:
[   22.835942] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad8
[   22.836410] flags: 0x200000000000000(node=0|zone=2)
[   22.836992] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   22.837649] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.838238] page dumped because: kasan: bad access detected
[   22.838620] 
[   22.838842] Memory state around the buggy address:
[   22.839302]  ffff888102ad7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.839927]  ffff888102ad7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.840572] >ffff888102ad8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.841105]                    ^
[   22.841363]  ffff888102ad8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.841806]  ffff888102ad8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.842326] ==================================================================
[   22.691882] ==================================================================
[   22.692732] BUG: KASAN: use-after-free in mempool_uaf_helper+0x394/0x400
[   22.693080] Read of size 1 at addr ffff888102a30000 by task kunit_try_catch/236
[   22.693713] 
[   22.693976] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   22.696047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.696900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.698177] Call Trace:
[   22.698438]  <TASK>
[   22.698753]  dump_stack_lvl+0x73/0xb0
[   22.699128]  print_report+0xd1/0x640
[   22.699759]  ? __virt_addr_valid+0x1db/0x2d0
[   22.700145]  ? kasan_addr_to_slab+0x11/0xa0
[   22.700445]  kasan_report+0x102/0x140
[   22.701514]  ? mempool_uaf_helper+0x394/0x400
[   22.702060]  ? mempool_uaf_helper+0x394/0x400
[   22.702571]  __asan_report_load1_noabort+0x18/0x20
[   22.703267]  mempool_uaf_helper+0x394/0x400
[   22.703640]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   22.704248]  ? finish_task_switch.isra.0+0x153/0x700
[   22.705346]  mempool_kmalloc_large_uaf+0xb3/0x100
[   22.706016]  ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10
[   22.706323]  ? __switch_to+0x5d9/0xf60
[   22.707412]  ? __pfx_mempool_kmalloc+0x10/0x10
[   22.708522]  ? __pfx_mempool_kfree+0x10/0x10
[   22.708939]  ? __pfx_read_tsc+0x10/0x10
[   22.709733]  ? ktime_get_ts64+0x84/0x230
[   22.710137]  kunit_try_run_case+0x1b3/0x490
[   22.711282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.711661]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.712175]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.713285]  ? __kthread_parkme+0x82/0x160
[   22.714017]  ? preempt_count_sub+0x50/0x80
[   22.714520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.714934]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.715711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.716309]  kthread+0x257/0x310
[   22.717229]  ? __pfx_kthread+0x10/0x10
[   22.717936]  ret_from_fork+0x41/0x80
[   22.718546]  ? __pfx_kthread+0x10/0x10
[   22.718895]  ret_from_fork_asm+0x1a/0x30
[   22.719637]  </TASK>
[   22.719886] 
[   22.720127] The buggy address belongs to the physical page:
[   22.720474] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30
[   22.721133] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.721630] flags: 0x200000000000040(head|node=0|zone=2)
[   22.722278] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.723038] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.723456] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.724357] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.724974] head: 0200000000000002 ffffea00040a8c01 ffffffffffffffff 0000000000000000
[   22.726441] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   22.726874] page dumped because: kasan: bad access detected
[   22.727182] 
[   22.728315] Memory state around the buggy address:
[   22.728847]  ffff888102a2ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.729665]  ffff888102a2ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.730900] >ffff888102a30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.731378]                    ^
[   22.731811]  ffff888102a30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.732546]  ffff888102a30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.733334] ==================================================================