Hay
Date
May 30, 2025, 4:14 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
x15

[   37.168414] ==================================================================
[   37.177789] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   37.184901] Read of size 1 at addr ffff000805857240 by task kunit_try_catch/275
[   37.192192] 
[   37.193679] CPU: 2 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   37.193733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.193752] Hardware name: WinLink E850-96 board (DT)
[   37.193774] Call trace:
[   37.193788]  show_stack+0x20/0x38 (C)
[   37.193828]  dump_stack_lvl+0x8c/0xd0
[   37.193866]  print_report+0x118/0x608
[   37.193904]  kasan_report+0xdc/0x128
[   37.193937]  __asan_report_load1_noabort+0x20/0x30
[   37.193971]  mempool_uaf_helper+0x314/0x340
[   37.194002]  mempool_slab_uaf+0xc0/0x118
[   37.194036]  kunit_try_run_case+0x170/0x3f0
[   37.194072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.194113]  kthread+0x328/0x630
[   37.194142]  ret_from_fork+0x10/0x20
[   37.194176] 
[   37.261287] Allocated by task 275:
[   37.264677]  kasan_save_stack+0x3c/0x68
[   37.268492]  kasan_save_track+0x20/0x40
[   37.272312]  kasan_save_alloc_info+0x40/0x58
[   37.276565]  __kasan_mempool_unpoison_object+0xbc/0x180
[   37.281775]  remove_element+0x16c/0x1f8
[   37.285593]  mempool_alloc_preallocated+0x58/0xc0
[   37.290280]  mempool_uaf_helper+0xa4/0x340
[   37.294360]  mempool_slab_uaf+0xc0/0x118
[   37.298267]  kunit_try_run_case+0x170/0x3f0
[   37.302433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.307902]  kthread+0x328/0x630
[   37.311114]  ret_from_fork+0x10/0x20
[   37.314672] 
[   37.316149] Freed by task 275:
[   37.319188]  kasan_save_stack+0x3c/0x68
[   37.323006]  kasan_save_track+0x20/0x40
[   37.326825]  kasan_save_free_info+0x4c/0x78
[   37.330992]  __kasan_mempool_poison_object+0xc0/0x150
[   37.336027]  mempool_free+0x28c/0x328
[   37.339672]  mempool_uaf_helper+0x104/0x340
[   37.343839]  mempool_slab_uaf+0xc0/0x118
[   37.347745]  kunit_try_run_case+0x170/0x3f0
[   37.351911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.357380]  kthread+0x328/0x630
[   37.360592]  ret_from_fork+0x10/0x20
[   37.364151] 
[   37.365628] The buggy address belongs to the object at ffff000805857240
[   37.365628]  which belongs to the cache test_cache of size 123
[   37.378041] The buggy address is located 0 bytes inside of
[   37.378041]  freed 123-byte region [ffff000805857240, ffff0008058572bb)
[   37.390105] 
[   37.391583] The buggy address belongs to the physical page:
[   37.397141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885857
[   37.405125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.411635] page_type: f5(slab)
[   37.414770] raw: 0bfffe0000000000 ffff000801dbb400 dead000000000122 0000000000000000
[   37.422490] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   37.430209] page dumped because: kasan: bad access detected
[   37.435766] 
[   37.437240] Memory state around the buggy address:
[   37.442021]  ffff000805857100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.449223]  ffff000805857180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.456429] >ffff000805857200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   37.463628]                                            ^
[   37.468927]  ffff000805857280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.476132]  ffff000805857300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.483333] ==================================================================
[   36.579403] ==================================================================
[   36.583617] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   36.590729] Read of size 1 at addr ffff000801dbdd00 by task kunit_try_catch/271
[   36.598016] 
[   36.599502] CPU: 2 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   36.599561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.599577] Hardware name: WinLink E850-96 board (DT)
[   36.599599] Call trace:
[   36.599613]  show_stack+0x20/0x38 (C)
[   36.599651]  dump_stack_lvl+0x8c/0xd0
[   36.599689]  print_report+0x118/0x608
[   36.599725]  kasan_report+0xdc/0x128
[   36.599758]  __asan_report_load1_noabort+0x20/0x30
[   36.599789]  mempool_uaf_helper+0x314/0x340
[   36.599820]  mempool_kmalloc_uaf+0xc4/0x120
[   36.599852]  kunit_try_run_case+0x170/0x3f0
[   36.599887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.599926]  kthread+0x328/0x630
[   36.599954]  ret_from_fork+0x10/0x20
[   36.599992] 
[   36.667373] Allocated by task 271:
[   36.670763]  kasan_save_stack+0x3c/0x68
[   36.674578]  kasan_save_track+0x20/0x40
[   36.678399]  kasan_save_alloc_info+0x40/0x58
[   36.682650]  __kasan_mempool_unpoison_object+0x11c/0x180
[   36.687946]  remove_element+0x130/0x1f8
[   36.691765]  mempool_alloc_preallocated+0x58/0xc0
[   36.696453]  mempool_uaf_helper+0xa4/0x340
[   36.700532]  mempool_kmalloc_uaf+0xc4/0x120
[   36.704699]  kunit_try_run_case+0x170/0x3f0
[   36.708865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.714336]  kthread+0x328/0x630
[   36.717546]  ret_from_fork+0x10/0x20
[   36.721105] 
[   36.722582] Freed by task 271:
[   36.725618]  kasan_save_stack+0x3c/0x68
[   36.729438]  kasan_save_track+0x20/0x40
[   36.733258]  kasan_save_free_info+0x4c/0x78
[   36.737424]  __kasan_mempool_poison_object+0xc0/0x150
[   36.742459]  mempool_free+0x28c/0x328
[   36.746104]  mempool_uaf_helper+0x104/0x340
[   36.750271]  mempool_kmalloc_uaf+0xc4/0x120
[   36.754438]  kunit_try_run_case+0x170/0x3f0
[   36.758604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.764073]  kthread+0x328/0x630
[   36.767285]  ret_from_fork+0x10/0x20
[   36.770843] 
[   36.772322] The buggy address belongs to the object at ffff000801dbdd00
[   36.772322]  which belongs to the cache kmalloc-128 of size 128
[   36.784821] The buggy address is located 0 bytes inside of
[   36.784821]  freed 128-byte region [ffff000801dbdd00, ffff000801dbdd80)
[   36.796885] 
[   36.798363] The buggy address belongs to the physical page:
[   36.803921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dbc
[   36.811904] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.819544] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.826487] page_type: f5(slab)
[   36.829624] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.837343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.845070] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.852880] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.860693] head: 0bfffe0000000001 fffffdffe0076f01 00000000ffffffff 00000000ffffffff
[   36.868505] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.876311] page dumped because: kasan: bad access detected
[   36.881868] 
[   36.883342] Memory state around the buggy address:
[   36.888124]  ffff000801dbdc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.895326]  ffff000801dbdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.902531] >ffff000801dbdd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.909730]                    ^
[   36.912946]  ffff000801dbdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.920152]  ffff000801dbde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.927353] ==================================================================

[   27.876549] ==================================================================
[   27.876699] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   27.876854] Read of size 1 at addr fff00000c56e8300 by task kunit_try_catch/228
[   27.876972] 
[   27.877055] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   27.877275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.877341] Hardware name: linux,dummy-virt (DT)
[   27.877415] Call trace:
[   27.877470]  show_stack+0x20/0x38 (C)
[   27.877596]  dump_stack_lvl+0x8c/0xd0
[   27.878352]  print_report+0x118/0x608
[   27.878455]  kasan_report+0xdc/0x128
[   27.878555]  __asan_report_load1_noabort+0x20/0x30
[   27.878753]  mempool_uaf_helper+0x314/0x340
[   27.878961]  mempool_kmalloc_uaf+0xc4/0x120
[   27.879201]  kunit_try_run_case+0x170/0x3f0
[   27.879334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.879487]  kthread+0x328/0x630
[   27.879612]  ret_from_fork+0x10/0x20
[   27.879788] 
[   27.879869] Allocated by task 228:
[   27.880000]  kasan_save_stack+0x3c/0x68
[   27.880110]  kasan_save_track+0x20/0x40
[   27.880235]  kasan_save_alloc_info+0x40/0x58
[   27.880382]  __kasan_mempool_unpoison_object+0x11c/0x180
[   27.880624]  remove_element+0x130/0x1f8
[   27.880756]  mempool_alloc_preallocated+0x58/0xc0
[   27.880870]  mempool_uaf_helper+0xa4/0x340
[   27.880979]  mempool_kmalloc_uaf+0xc4/0x120
[   27.881092]  kunit_try_run_case+0x170/0x3f0
[   27.881192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.881704]  kthread+0x328/0x630
[   27.882030]  ret_from_fork+0x10/0x20
[   27.882134] 
[   27.882181] Freed by task 228:
[   27.882367]  kasan_save_stack+0x3c/0x68
[   27.882465]  kasan_save_track+0x20/0x40
[   27.882777]  kasan_save_free_info+0x4c/0x78
[   27.882892]  __kasan_mempool_poison_object+0xc0/0x150
[   27.883318]  mempool_free+0x28c/0x328
[   27.883500]  mempool_uaf_helper+0x104/0x340
[   27.883623]  mempool_kmalloc_uaf+0xc4/0x120
[   27.883914]  kunit_try_run_case+0x170/0x3f0
[   27.884030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.884255]  kthread+0x328/0x630
[   27.884550]  ret_from_fork+0x10/0x20
[   27.884700] 
[   27.884772] The buggy address belongs to the object at fff00000c56e8300
[   27.884772]  which belongs to the cache kmalloc-128 of size 128
[   27.884976] The buggy address is located 0 bytes inside of
[   27.884976]  freed 128-byte region [fff00000c56e8300, fff00000c56e8380)
[   27.885138] 
[   27.885196] The buggy address belongs to the physical page:
[   27.885296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   27.885437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.885824] page_type: f5(slab)
[   27.885961] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   27.886124] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.886227] page dumped because: kasan: bad access detected
[   27.886332] 
[   27.886378] Memory state around the buggy address:
[   27.886462]  fff00000c56e8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.886613]  fff00000c56e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.887348] >fff00000c56e8300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.887473]                    ^
[   27.887678]  fff00000c56e8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.888114]  fff00000c56e8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.888231] ==================================================================
[   27.960494] ==================================================================
[   27.961143] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   27.961334] Read of size 1 at addr fff00000c7895240 by task kunit_try_catch/232
[   27.961449] 
[   27.961523] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   27.963265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.963875] Hardware name: linux,dummy-virt (DT)
[   27.964486] Call trace:
[   27.964651]  show_stack+0x20/0x38 (C)
[   27.965093]  dump_stack_lvl+0x8c/0xd0
[   27.966161]  print_report+0x118/0x608
[   27.966430]  kasan_report+0xdc/0x128
[   27.967253]  __asan_report_load1_noabort+0x20/0x30
[   27.967766]  mempool_uaf_helper+0x314/0x340
[   27.968074]  mempool_slab_uaf+0xc0/0x118
[   27.968348]  kunit_try_run_case+0x170/0x3f0
[   27.968558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.968768]  kthread+0x328/0x630
[   27.968891]  ret_from_fork+0x10/0x20
[   27.969491] 
[   27.969563] Allocated by task 232:
[   27.969666]  kasan_save_stack+0x3c/0x68
[   27.969794]  kasan_save_track+0x20/0x40
[   27.969969]  kasan_save_alloc_info+0x40/0x58
[   27.970072]  __kasan_mempool_unpoison_object+0xbc/0x180
[   27.970406]  remove_element+0x16c/0x1f8
[   27.970790]  mempool_alloc_preallocated+0x58/0xc0
[   27.971079]  mempool_uaf_helper+0xa4/0x340
[   27.971211]  mempool_slab_uaf+0xc0/0x118
[   27.971362]  kunit_try_run_case+0x170/0x3f0
[   27.971464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.971797]  kthread+0x328/0x630
[   27.972183]  ret_from_fork+0x10/0x20
[   27.972301] 
[   27.972351] Freed by task 232:
[   27.972934]  kasan_save_stack+0x3c/0x68
[   27.973141]  kasan_save_track+0x20/0x40
[   27.973328]  kasan_save_free_info+0x4c/0x78
[   27.973907]  __kasan_mempool_poison_object+0xc0/0x150
[   27.974108]  mempool_free+0x28c/0x328
[   27.974463]  mempool_uaf_helper+0x104/0x340
[   27.974991]  mempool_slab_uaf+0xc0/0x118
[   27.975093]  kunit_try_run_case+0x170/0x3f0
[   27.975215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.975316]  kthread+0x328/0x630
[   27.975406]  ret_from_fork+0x10/0x20
[   27.975812] 
[   27.976019] The buggy address belongs to the object at fff00000c7895240
[   27.976019]  which belongs to the cache test_cache of size 123
[   27.976158] The buggy address is located 0 bytes inside of
[   27.976158]  freed 123-byte region [fff00000c7895240, fff00000c78952bb)
[   27.976917] 
[   27.977241] The buggy address belongs to the physical page:
[   27.977354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895
[   27.977880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.978644] page_type: f5(slab)
[   27.978806] raw: 0bfffe0000000000 fff00000c56eb280 dead000000000122 0000000000000000
[   27.979366] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   27.979593] page dumped because: kasan: bad access detected
[   27.979675] 
[   27.979739] Memory state around the buggy address:
[   27.979819]  fff00000c7895100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.980034]  fff00000c7895180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.980151] >fff00000c7895200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   27.980558]                                            ^
[   27.981166]  fff00000c7895280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.981286]  fff00000c7895300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.982006] ==================================================================

[   20.615692] ==================================================================
[   20.616892] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   20.617649] Read of size 1 at addr ffff8881022e3240 by task kunit_try_catch/248
[   20.618856] 
[   20.619311] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   20.619588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.619609] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.619642] Call Trace:
[   20.619659]  <TASK>
[   20.619691]  dump_stack_lvl+0x73/0xb0
[   20.619758]  print_report+0xd1/0x650
[   20.619797]  ? __virt_addr_valid+0x1db/0x2d0
[   20.619853]  ? mempool_uaf_helper+0x392/0x400
[   20.619887]  ? kasan_complete_mode_report_info+0x64/0x200
[   20.619940]  ? mempool_uaf_helper+0x392/0x400
[   20.620006]  kasan_report+0x141/0x180
[   20.620043]  ? mempool_uaf_helper+0x392/0x400
[   20.620101]  __asan_report_load1_noabort+0x18/0x20
[   20.620134]  mempool_uaf_helper+0x392/0x400
[   20.620187]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   20.620226]  ? __pfx_sched_clock_cpu+0x10/0x10
[   20.620283]  ? finish_task_switch.isra.0+0x153/0x700
[   20.620323]  mempool_slab_uaf+0xea/0x140
[   20.620373]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   20.620403]  ? trace_hardirqs_on+0x37/0xe0
[   20.620495]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   20.620549]  ? __pfx_mempool_free_slab+0x10/0x10
[   20.620582]  ? __pfx_read_tsc+0x10/0x10
[   20.620616]  ? ktime_get_ts64+0x86/0x230
[   20.620645]  ? _raw_spin_unlock_irqrestore+0x49/0x90
[   20.620697]  kunit_try_run_case+0x1a5/0x480
[   20.620743]  ? __kthread_parkme+0x82/0x180
[   20.620773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.620804]  ? __kthread_parkme+0x82/0x180
[   20.620832]  ? preempt_count_sub+0x50/0x80
[   20.620864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.620893]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.620929]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.620987]  kthread+0x337/0x6f0
[   20.621020]  ? trace_preempt_on+0x20/0xc0
[   20.621053]  ? __pfx_kthread+0x10/0x10
[   20.621083]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.621116]  ? calculate_sigpending+0x7b/0xa0
[   20.621152]  ? __pfx_kthread+0x10/0x10
[   20.621183]  ret_from_fork+0x116/0x1d0
[   20.621208]  ? __pfx_kthread+0x10/0x10
[   20.621237]  ret_from_fork_asm+0x1a/0x30
[   20.621280]  </TASK>
[   20.621295] 
[   20.642723] Allocated by task 248:
[   20.643390]  kasan_save_stack+0x45/0x70
[   20.644191]  kasan_save_track+0x18/0x40
[   20.644521]  kasan_save_alloc_info+0x3b/0x50
[   20.645009]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   20.645415]  remove_element+0x11e/0x190
[   20.646393]  mempool_alloc_preallocated+0x4d/0x90
[   20.646757]  mempool_uaf_helper+0x96/0x400
[   20.647413]  mempool_slab_uaf+0xea/0x140
[   20.647736]  kunit_try_run_case+0x1a5/0x480
[   20.648085]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.648486]  kthread+0x337/0x6f0
[   20.648788]  ret_from_fork+0x116/0x1d0
[   20.649201]  ret_from_fork_asm+0x1a/0x30
[   20.649530] 
[   20.649771] Freed by task 248:
[   20.650128]  kasan_save_stack+0x45/0x70
[   20.650478]  kasan_save_track+0x18/0x40
[   20.650795]  kasan_save_free_info+0x3f/0x60
[   20.651237]  __kasan_mempool_poison_object+0x131/0x1d0
[   20.651755]  mempool_free+0x2ec/0x380
[   20.652217]  mempool_uaf_helper+0x11a/0x400
[   20.652755]  mempool_slab_uaf+0xea/0x140
[   20.653253]  kunit_try_run_case+0x1a5/0x480
[   20.653798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.654311]  kthread+0x337/0x6f0
[   20.654811]  ret_from_fork+0x116/0x1d0
[   20.655150]  ret_from_fork_asm+0x1a/0x30
[   20.655474] 
[   20.655731] The buggy address belongs to the object at ffff8881022e3240
[   20.655731]  which belongs to the cache test_cache of size 123
[   20.656842] The buggy address is located 0 bytes inside of
[   20.656842]  freed 123-byte region [ffff8881022e3240, ffff8881022e32bb)
[   20.657850] 
[   20.658081] The buggy address belongs to the physical page:
[   20.658659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022e3
[   20.659353] flags: 0x200000000000000(node=0|zone=2)
[   20.659863] page_type: f5(slab)
[   20.660279] raw: 0200000000000000 ffff8881022d3640 dead000000000122 0000000000000000
[   20.661053] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   20.661614] page dumped because: kasan: bad access detected
[   20.662238] 
[   20.662485] Memory state around the buggy address:
[   20.663029]  ffff8881022e3100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.663599]  ffff8881022e3180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.664274] >ffff8881022e3200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   20.664992]                                            ^
[   20.665467]  ffff8881022e3280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.666136]  ffff8881022e3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.666809] ==================================================================
[   20.498085] ==================================================================
[   20.499529] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   20.500347] Read of size 1 at addr ffff8881022e0100 by task kunit_try_catch/244
[   20.501516] 
[   20.501735] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   20.501848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.501889] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.502122] Call Trace:
[   20.502166]  <TASK>
[   20.502212]  dump_stack_lvl+0x73/0xb0
[   20.502268]  print_report+0xd1/0x650
[   20.502307]  ? __virt_addr_valid+0x1db/0x2d0
[   20.502343]  ? mempool_uaf_helper+0x392/0x400
[   20.502376]  ? kasan_complete_mode_report_info+0x64/0x200
[   20.502409]  ? mempool_uaf_helper+0x392/0x400
[   20.502442]  kasan_report+0x141/0x180
[   20.502474]  ? mempool_uaf_helper+0x392/0x400
[   20.502512]  __asan_report_load1_noabort+0x18/0x20
[   20.502542]  mempool_uaf_helper+0x392/0x400
[   20.502574]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   20.502610]  ? __kasan_check_write+0x18/0x20
[   20.502638]  ? __pfx_sched_clock_cpu+0x10/0x10
[   20.502671]  ? finish_task_switch.isra.0+0x153/0x700
[   20.502750]  mempool_kmalloc_uaf+0xef/0x140
[   20.502788]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   20.502826]  ? __pfx_mempool_kmalloc+0x10/0x10
[   20.502855]  ? __pfx_mempool_kfree+0x10/0x10
[   20.502885]  ? __pfx_read_tsc+0x10/0x10
[   20.502916]  ? ktime_get_ts64+0x86/0x230
[   20.502950]  kunit_try_run_case+0x1a5/0x480
[   20.503010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.503041]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.503079]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.503114]  ? __kthread_parkme+0x82/0x180
[   20.503143]  ? preempt_count_sub+0x50/0x80
[   20.503175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.503206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.503243]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.503279]  kthread+0x337/0x6f0
[   20.503308]  ? trace_preempt_on+0x20/0xc0
[   20.503341]  ? __pfx_kthread+0x10/0x10
[   20.503371]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.503404]  ? calculate_sigpending+0x7b/0xa0
[   20.503438]  ? __pfx_kthread+0x10/0x10
[   20.503469]  ret_from_fork+0x116/0x1d0
[   20.503495]  ? __pfx_kthread+0x10/0x10
[   20.503523]  ret_from_fork_asm+0x1a/0x30
[   20.503565]  </TASK>
[   20.503581] 
[   20.523855] Allocated by task 244:
[   20.524845]  kasan_save_stack+0x45/0x70
[   20.525182]  kasan_save_track+0x18/0x40
[   20.525635]  kasan_save_alloc_info+0x3b/0x50
[   20.526399]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   20.526986]  remove_element+0x11e/0x190
[   20.527651]  mempool_alloc_preallocated+0x4d/0x90
[   20.528168]  mempool_uaf_helper+0x96/0x400
[   20.528881]  mempool_kmalloc_uaf+0xef/0x140
[   20.529353]  kunit_try_run_case+0x1a5/0x480
[   20.530107]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.530540]  kthread+0x337/0x6f0
[   20.531020]  ret_from_fork+0x116/0x1d0
[   20.531651]  ret_from_fork_asm+0x1a/0x30
[   20.532176] 
[   20.532342] Freed by task 244:
[   20.532600]  kasan_save_stack+0x45/0x70
[   20.533848]  kasan_save_track+0x18/0x40
[   20.534227]  kasan_save_free_info+0x3f/0x60
[   20.535001]  __kasan_mempool_poison_object+0x131/0x1d0
[   20.535429]  mempool_free+0x2ec/0x380
[   20.535742]  mempool_uaf_helper+0x11a/0x400
[   20.536093]  mempool_kmalloc_uaf+0xef/0x140
[   20.536425]  kunit_try_run_case+0x1a5/0x480
[   20.537744]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.538109]  kthread+0x337/0x6f0
[   20.538751]  ret_from_fork+0x116/0x1d0
[   20.539434]  ret_from_fork_asm+0x1a/0x30
[   20.540134] 
[   20.540300] The buggy address belongs to the object at ffff8881022e0100
[   20.540300]  which belongs to the cache kmalloc-128 of size 128
[   20.541773] The buggy address is located 0 bytes inside of
[   20.541773]  freed 128-byte region [ffff8881022e0100, ffff8881022e0180)
[   20.542688] 
[   20.543420] The buggy address belongs to the physical page:
[   20.543930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022e0
[   20.544504] flags: 0x200000000000000(node=0|zone=2)
[   20.545193] page_type: f5(slab)
[   20.545569] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   20.546182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.546734] page dumped because: kasan: bad access detected
[   20.547722] 
[   20.548289] Memory state around the buggy address:
[   20.548709]  ffff8881022e0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.549364]  ffff8881022e0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.550300] >ffff8881022e0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.550876]                    ^
[   20.551253]  ffff8881022e0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.551742]  ffff8881022e0200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.552796] ==================================================================

[   63.914215] ==================================================================
[   63.926055] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x388/0x3b8
[   63.933258] Read of size 1 at addr cc8d2240 by task kunit_try_catch/283
[   63.939910] 
[   63.941436] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   63.941467] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   63.941467] Hardware name: Generic DRA74X (Flattened Device Tree)
[   63.941497] Call trace: 
[   63.941497]  unwind_backtrace from show_stack+0x18/0x1c
[   63.941528]  show_stack from dump_stack_lvl+0x70/0x90
[   63.941558]  dump_stack_lvl from print_report+0x158/0x528
[   63.941589]  print_report from kasan_report+0xdc/0x118
[   63.941619]  kasan_report from mempool_uaf_helper+0x388/0x3b8
[   63.941650]  mempool_uaf_helper from mempool_slab_uaf+0xb8/0x100
[   63.941680]  mempool_slab_uaf from kunit_try_run_case+0x22c/0x5a8
[   63.941711]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.941772]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   63.941802]  kthread from ret_from_fork+0x14/0x20
[   63.941833] Exception stack(0xf2423fb0 to 0xf2423ff8)
[   63.941833] 3fa0:                                     00000000 00000000 00000000 00000000
[   63.941864] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   63.941894] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   63.941894] 
[   64.053710] Allocated by task 283:
[   64.057128]  kasan_save_track+0x30/0x5c
[   64.061004]  __kasan_mempool_unpoison_object+0xec/0x14c
[   64.066284]  remove_element+0x1d4/0x264
[   64.070159]  mempool_alloc_preallocated+0x60/0x9c
[   64.074920]  mempool_uaf_helper+0x90/0x3b8
[   64.079040]  mempool_slab_uaf+0xb8/0x100
[   64.083007]  kunit_try_run_case+0x22c/0x5a8
[   64.087249]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   64.092773]  kthread+0x464/0x810
[   64.096038]  ret_from_fork+0x14/0x20
[   64.099639] 
[   64.101165] Freed by task 283:
[   64.104248]  kasan_save_track+0x30/0x5c
[   64.108093]  kasan_save_free_info+0x3c/0x48
[   64.112335]  __kasan_mempool_poison_object+0x94/0x128
[   64.117431]  mempool_free+0x360/0x440
[   64.121124]  mempool_uaf_helper+0x13c/0x3b8
[   64.125335]  mempool_slab_uaf+0xb8/0x100
[   64.129302]  kunit_try_run_case+0x22c/0x5a8
[   64.133544]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   64.139068]  kthread+0x464/0x810
[   64.142333]  ret_from_fork+0x14/0x20
[   64.145935] 
[   64.147460] The buggy address belongs to the object at cc8d2240
[   64.147460]  which belongs to the cache test_cache of size 123
[   64.159271] The buggy address is located 0 bytes inside of
[   64.159271]  freed 123-byte region [cc8d2240, cc8d22bb)
[   64.170043] 
[   64.171539] The buggy address belongs to the physical page:
[   64.177154] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8d2
[   64.184448] flags: 0x0(zone=0)
[   64.187530] page_type: f5(slab)
[   64.190704] raw: 00000000 c8f6d600 00000122 00000000 00000000 80150015 f5000000 00000000
[   64.198852] raw: 00000000
[   64.201477] page dumped because: kasan: bad access detected
[   64.207092] 
[   64.208618] Memory state around the buggy address:
[   64.213439]  cc8d2100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.220001]  cc8d2180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.226593] >cc8d2200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   64.233154]                                    ^
[   64.237823]  cc8d2280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.244384]  cc8d2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.250976] ==================================================================
[   63.321411] ==================================================================
[   63.332977] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x388/0x3b8
[   63.340148] Read of size 1 at addr cc854900 by task kunit_try_catch/279
[   63.346832] 
[   63.348327] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   63.348358] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   63.348358] Hardware name: Generic DRA74X (Flattened Device Tree)
[   63.348388] Call trace: 
[   63.348388]  unwind_backtrace from show_stack+0x18/0x1c
[   63.348419]  show_stack from dump_stack_lvl+0x70/0x90
[   63.348449]  dump_stack_lvl from print_report+0x158/0x528
[   63.348480]  print_report from kasan_report+0xdc/0x118
[   63.348510]  kasan_report from mempool_uaf_helper+0x388/0x3b8
[   63.348510]  mempool_uaf_helper from mempool_kmalloc_uaf+0xbc/0x108
[   63.348541]  mempool_kmalloc_uaf from kunit_try_run_case+0x22c/0x5a8
[   63.348571]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.348602]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   63.348632]  kthread from ret_from_fork+0x14/0x20
[   63.348663] Exception stack(0xf2413fb0 to 0xf2413ff8)
[   63.348663] 3fa0:                                     00000000 00000000 00000000 00000000
[   63.348693] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   63.348693] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   63.348724] 
[   63.461029] Allocated by task 279:
[   63.464447]  kasan_save_track+0x30/0x5c
[   63.468322]  remove_element+0x180/0x264
[   63.472167]  mempool_alloc_preallocated+0x60/0x9c
[   63.476928]  mempool_uaf_helper+0x90/0x3b8
[   63.481048]  mempool_kmalloc_uaf+0xbc/0x108
[   63.485260]  kunit_try_run_case+0x22c/0x5a8
[   63.489501]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.495025]  kthread+0x464/0x810
[   63.498260]  ret_from_fork+0x14/0x20
[   63.501892] 
[   63.503387] Freed by task 279:
[   63.506469]  kasan_save_track+0x30/0x5c
[   63.510314]  kasan_save_free_info+0x3c/0x48
[   63.514526]  __kasan_mempool_poison_object+0x94/0x128
[   63.519622]  mempool_free+0x360/0x440
[   63.523315]  mempool_uaf_helper+0x13c/0x3b8
[   63.527526]  mempool_kmalloc_uaf+0xbc/0x108
[   63.531768]  kunit_try_run_case+0x22c/0x5a8
[   63.535980]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.541503]  kthread+0x464/0x810
[   63.544769]  ret_from_fork+0x14/0x20
[   63.548370] 
[   63.549865] The buggy address belongs to the object at cc854900
[   63.549865]  which belongs to the cache kmalloc-128 of size 128
[   63.561767] The buggy address is located 0 bytes inside of
[   63.561767]  freed 128-byte region [cc854900, cc854980)
[   63.572540] 
[   63.574035] The buggy address belongs to the physical page:
[   63.579650] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c854
[   63.586914] flags: 0x0(zone=0)
[   63.589996] page_type: f5(slab)
[   63.593170] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   63.601318] raw: 00000000
[   63.603942] page dumped because: kasan: bad access detected
[   63.609558] 
[   63.611053] Memory state around the buggy address:
[   63.615875]  cc854800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.622436]  cc854880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.629028] >cc854900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.635589]            ^
[   63.638153]  cc854980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.644714]  cc854a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.651275] ==================================================================