Hay
Date
June 24, 2025, 11:37 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   47.401141] ==================================================================
[   47.413056] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   47.420294] Read of size 1 at addr ffff0000875de240 by task kunit_try_catch/329
[   47.427699] 
[   47.429233] CPU: 4 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   47.429271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.429279] Hardware name: Thundercomm Dragonboard 845c (DT)
[   47.429294] Call trace:
[   47.429304]  show_stack+0x20/0x38 (C)
[   47.429324]  dump_stack_lvl+0x8c/0xd0
[   47.429347]  print_report+0x118/0x608
[   47.429367]  kasan_report+0xdc/0x128
[   47.429384]  __asan_report_load1_noabort+0x20/0x30
[   47.429402]  mempool_uaf_helper+0x314/0x340
[   47.429418]  mempool_slab_uaf+0xc0/0x118
[   47.429437]  kunit_try_run_case+0x170/0x3f0
[   47.429458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.429479]  kthread+0x328/0x630
[   47.429495]  ret_from_fork+0x10/0x20
[   47.429514] 
[   47.499155] Allocated by task 329:
[   47.502610]  kasan_save_stack+0x3c/0x68
[   47.506517]  kasan_save_track+0x20/0x40
[   47.510421]  kasan_save_alloc_info+0x40/0x58
[   47.514754]  __kasan_mempool_unpoison_object+0xbc/0x180
[   47.520053]  remove_element+0x16c/0x1f8
[   47.523956]  mempool_alloc_preallocated+0x58/0xc0
[   47.528736]  mempool_uaf_helper+0xa4/0x340
[   47.532896]  mempool_slab_uaf+0xc0/0x118
[   47.536884]  kunit_try_run_case+0x170/0x3f0
[   47.541132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.546694]  kthread+0x328/0x630
[   47.549975]  ret_from_fork+0x10/0x20
[   47.553615] 
[   47.555148] Freed by task 329:
[   47.558253]  kasan_save_stack+0x3c/0x68
[   47.562156]  kasan_save_track+0x20/0x40
[   47.566058]  kasan_save_free_info+0x4c/0x78
[   47.570304]  __kasan_mempool_poison_object+0xc0/0x150
[   47.575430]  mempool_free+0x28c/0x328
[   47.579148]  mempool_uaf_helper+0x104/0x340
[   47.583392]  mempool_slab_uaf+0xc0/0x118
[   47.587380]  kunit_try_run_case+0x170/0x3f0
[   47.591626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.597189]  kthread+0x328/0x630
[   47.600471]  ret_from_fork+0x10/0x20
[   47.604111] 
[   47.605634] The buggy address belongs to the object at ffff0000875de240
[   47.605634]  which belongs to the cache test_cache of size 123
[   47.618198] The buggy address is located 0 bytes inside of
[   47.618198]  freed 123-byte region [ffff0000875de240, ffff0000875de2bb)
[   47.630417] 
[   47.631947] The buggy address belongs to the physical page:
[   47.637591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1075de
[   47.645700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.652311] page_type: f5(slab)
[   47.655509] raw: 0bfffe0000000000 ffff000083322000 dead000000000122 0000000000000000
[   47.663349] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   47.671183] page dumped because: kasan: bad access detected
[   47.676821] 
[   47.678344] Memory state around the buggy address:
[   47.683204]  ffff0000875de100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.690518]  ffff0000875de180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.697830] >ffff0000875de200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   47.705140]                                            ^
[   47.710522]  ffff0000875de280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.717836]  ffff0000875de300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.725146] ==================================================================
[   46.784775] ==================================================================
[   46.796457] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   46.803707] Read of size 1 at addr ffff000080dc0700 by task kunit_try_catch/325
[   46.811118] 
[   46.812658] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   46.812698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.812710] Hardware name: Thundercomm Dragonboard 845c (DT)
[   46.812726] Call trace:
[   46.812735]  show_stack+0x20/0x38 (C)
[   46.812760]  dump_stack_lvl+0x8c/0xd0
[   46.812784]  print_report+0x118/0x608
[   46.812806]  kasan_report+0xdc/0x128
[   46.812826]  __asan_report_load1_noabort+0x20/0x30
[   46.812848]  mempool_uaf_helper+0x314/0x340
[   46.812868]  mempool_kmalloc_uaf+0xc4/0x120
[   46.812886]  kunit_try_run_case+0x170/0x3f0
[   46.812911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.812937]  kthread+0x328/0x630
[   46.812957]  ret_from_fork+0x10/0x20
[   46.812979] 
[   46.882910] Allocated by task 325:
[   46.886373]  kasan_save_stack+0x3c/0x68
[   46.890283]  kasan_save_track+0x20/0x40
[   46.894191]  kasan_save_alloc_info+0x40/0x58
[   46.898528]  __kasan_mempool_unpoison_object+0x11c/0x180
[   46.903923]  remove_element+0x130/0x1f8
[   46.907837]  mempool_alloc_preallocated+0x58/0xc0
[   46.912616]  mempool_uaf_helper+0xa4/0x340
[   46.916785]  mempool_kmalloc_uaf+0xc4/0x120
[   46.921039]  kunit_try_run_case+0x170/0x3f0
[   46.925294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.930867]  kthread+0x328/0x630
[   46.934158]  ret_from_fork+0x10/0x20
[   46.937807] 
[   46.939334] Freed by task 325:
[   46.942449]  kasan_save_stack+0x3c/0x68
[   46.946357]  kasan_save_track+0x20/0x40
[   46.950268]  kasan_save_free_info+0x4c/0x78
[   46.954520]  __kasan_mempool_poison_object+0xc0/0x150
[   46.959659]  mempool_free+0x28c/0x328
[   46.963382]  mempool_uaf_helper+0x104/0x340
[   46.967632]  mempool_kmalloc_uaf+0xc4/0x120
[   46.971884]  kunit_try_run_case+0x170/0x3f0
[   46.976135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.981709]  kthread+0x328/0x630
[   46.984999]  ret_from_fork+0x10/0x20
[   46.988637] 
[   46.990168] The buggy address belongs to the object at ffff000080dc0700
[   46.990168]  which belongs to the cache kmalloc-128 of size 128
[   47.002830] The buggy address is located 0 bytes inside of
[   47.002830]  freed 128-byte region [ffff000080dc0700, ffff000080dc0780)
[   47.015050] 
[   47.016589] The buggy address belongs to the physical page:
[   47.022242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100dc0
[   47.030358] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.038117] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.045179] page_type: f5(slab)
[   47.048389] raw: 0bfffe0000000040 ffff000080002a00 dead000000000100 dead000000000122
[   47.056234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.064079] head: 0bfffe0000000040 ffff000080002a00 dead000000000100 dead000000000122
[   47.072011] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.079939] head: 0bfffe0000000001 fffffdffc2037001 00000000ffffffff 00000000ffffffff
[   47.087869] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   47.095795] page dumped because: kasan: bad access detected
[   47.101443] 
[   47.102972] Memory state around the buggy address:
[   47.107831]  ffff000080dc0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.115146]  ffff000080dc0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.122471] >ffff000080dc0700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.129791]                    ^
[   47.133079]  ffff000080dc0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.140403]  ffff000080dc0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.147715] ==================================================================

[   35.752653] ==================================================================
[   35.752817] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   35.752995] Read of size 1 at addr fff00000c7732d00 by task kunit_try_catch/238
[   35.753129] 
[   35.753229] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   35.753572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.753686] Hardware name: linux,dummy-virt (DT)
[   35.753996] Call trace:
[   35.754152]  show_stack+0x20/0x38 (C)
[   35.754341]  dump_stack_lvl+0x8c/0xd0
[   35.754510]  print_report+0x118/0x608
[   35.754708]  kasan_report+0xdc/0x128
[   35.754829]  __asan_report_load1_noabort+0x20/0x30
[   35.755034]  mempool_uaf_helper+0x314/0x340
[   35.755189]  mempool_kmalloc_uaf+0xc4/0x120
[   35.755555]  kunit_try_run_case+0x170/0x3f0
[   35.755997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.756255]  kthread+0x328/0x630
[   35.756682]  ret_from_fork+0x10/0x20
[   35.757454] 
[   35.757639] Allocated by task 238:
[   35.757755]  kasan_save_stack+0x3c/0x68
[   35.758689]  kasan_save_track+0x20/0x40
[   35.759027]  kasan_save_alloc_info+0x40/0x58
[   35.759487]  __kasan_mempool_unpoison_object+0x11c/0x180
[   35.759630]  remove_element+0x130/0x1f8
[   35.759877]  mempool_alloc_preallocated+0x58/0xc0
[   35.760003]  mempool_uaf_helper+0xa4/0x340
[   35.760158]  mempool_kmalloc_uaf+0xc4/0x120
[   35.760369]  kunit_try_run_case+0x170/0x3f0
[   35.760487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.760997]  kthread+0x328/0x630
[   35.761181]  ret_from_fork+0x10/0x20
[   35.761294] 
[   35.761375] Freed by task 238:
[   35.761477]  kasan_save_stack+0x3c/0x68
[   35.761586]  kasan_save_track+0x20/0x40
[   35.761683]  kasan_save_free_info+0x4c/0x78
[   35.761772]  __kasan_mempool_poison_object+0xc0/0x150
[   35.761875]  mempool_free+0x28c/0x328
[   35.761983]  mempool_uaf_helper+0x104/0x340
[   35.762093]  mempool_kmalloc_uaf+0xc4/0x120
[   35.762211]  kunit_try_run_case+0x170/0x3f0
[   35.762319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.762449]  kthread+0x328/0x630
[   35.762548]  ret_from_fork+0x10/0x20
[   35.762659] 
[   35.762739] The buggy address belongs to the object at fff00000c7732d00
[   35.762739]  which belongs to the cache kmalloc-128 of size 128
[   35.762880] The buggy address is located 0 bytes inside of
[   35.762880]  freed 128-byte region [fff00000c7732d00, fff00000c7732d80)
[   35.763399] 
[   35.763534] The buggy address belongs to the physical page:
[   35.763622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107732
[   35.765068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.765349] page_type: f5(slab)
[   35.765470] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.766171] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.766576] page dumped because: kasan: bad access detected
[   35.766906] 
[   35.767271] Memory state around the buggy address:
[   35.767699]  fff00000c7732c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.767862]  fff00000c7732c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.768065] >fff00000c7732d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.768223]                    ^
[   35.768380]  fff00000c7732d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.768968]  fff00000c7732e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.769344] ==================================================================
[   35.846052] ==================================================================
[   35.846214] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   35.846544] Read of size 1 at addr fff00000c77e5240 by task kunit_try_catch/242
[   35.846719] 
[   35.846803] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   35.847764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.848119] Hardware name: linux,dummy-virt (DT)
[   35.848211] Call trace:
[   35.848277]  show_stack+0x20/0x38 (C)
[   35.848411]  dump_stack_lvl+0x8c/0xd0
[   35.848908]  print_report+0x118/0x608
[   35.849202]  kasan_report+0xdc/0x128
[   35.849323]  __asan_report_load1_noabort+0x20/0x30
[   35.850400]  mempool_uaf_helper+0x314/0x340
[   35.851232]  mempool_slab_uaf+0xc0/0x118
[   35.852002]  kunit_try_run_case+0x170/0x3f0
[   35.852424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.852860]  kthread+0x328/0x630
[   35.854081]  ret_from_fork+0x10/0x20
[   35.854533] 
[   35.854946] Allocated by task 242:
[   35.855033]  kasan_save_stack+0x3c/0x68
[   35.855525]  kasan_save_track+0x20/0x40
[   35.856160]  kasan_save_alloc_info+0x40/0x58
[   35.856634]  __kasan_mempool_unpoison_object+0xbc/0x180
[   35.857035]  remove_element+0x16c/0x1f8
[   35.857488]  mempool_alloc_preallocated+0x58/0xc0
[   35.857735]  mempool_uaf_helper+0xa4/0x340
[   35.858460]  mempool_slab_uaf+0xc0/0x118
[   35.859403]  kunit_try_run_case+0x170/0x3f0
[   35.859520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.860261]  kthread+0x328/0x630
[   35.860355]  ret_from_fork+0x10/0x20
[   35.860454] 
[   35.860500] Freed by task 242:
[   35.862035]  kasan_save_stack+0x3c/0x68
[   35.862514]  kasan_save_track+0x20/0x40
[   35.862617]  kasan_save_free_info+0x4c/0x78
[   35.863291]  __kasan_mempool_poison_object+0xc0/0x150
[   35.863575]  mempool_free+0x28c/0x328
[   35.863670]  mempool_uaf_helper+0x104/0x340
[   35.863767]  mempool_slab_uaf+0xc0/0x118
[   35.863875]  kunit_try_run_case+0x170/0x3f0
[   35.865992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.866917]  kthread+0x328/0x630
[   35.867010]  ret_from_fork+0x10/0x20
[   35.867768] 
[   35.867822] The buggy address belongs to the object at fff00000c77e5240
[   35.867822]  which belongs to the cache test_cache of size 123
[   35.868865] The buggy address is located 0 bytes inside of
[   35.868865]  freed 123-byte region [fff00000c77e5240, fff00000c77e52bb)
[   35.869585] 
[   35.870136] The buggy address belongs to the physical page:
[   35.870285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e5
[   35.871240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.871465] page_type: f5(slab)
[   35.871572] raw: 0bfffe0000000000 fff00000c77d6640 dead000000000122 0000000000000000
[   35.871699] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   35.871801] page dumped because: kasan: bad access detected
[   35.873797] 
[   35.873948] Memory state around the buggy address:
[   35.874319]  fff00000c77e5100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.874442]  fff00000c77e5180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.874548] >fff00000c77e5200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   35.875265]                                            ^
[   35.875666]  fff00000c77e5280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.875770]  fff00000c77e5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.875869] ==================================================================

[   31.103488] ==================================================================
[   31.104528] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   31.105323] Read of size 1 at addr ffff888102df3240 by task kunit_try_catch/261
[   31.105882] 
[   31.106166] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   31.106406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.106454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.106535] Call Trace:
[   31.106586]  <TASK>
[   31.106676]  dump_stack_lvl+0x73/0xb0
[   31.106788]  print_report+0xd1/0x650
[   31.106864]  ? __virt_addr_valid+0x1db/0x2d0
[   31.106929]  ? mempool_uaf_helper+0x392/0x400
[   31.106981]  ? kasan_complete_mode_report_info+0x64/0x200
[   31.107023]  ? mempool_uaf_helper+0x392/0x400
[   31.107059]  kasan_report+0x141/0x180
[   31.107142]  ? mempool_uaf_helper+0x392/0x400
[   31.107191]  __asan_report_load1_noabort+0x18/0x20
[   31.107225]  mempool_uaf_helper+0x392/0x400
[   31.107257]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   31.107290]  ? __pfx_sched_clock_cpu+0x10/0x10
[   31.107322]  ? finish_task_switch.isra.0+0x153/0x700
[   31.107359]  mempool_slab_uaf+0xea/0x140
[   31.107389]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   31.107422]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   31.107453]  ? __pfx_mempool_free_slab+0x10/0x10
[   31.107486]  ? __pfx_read_tsc+0x10/0x10
[   31.107515]  ? ktime_get_ts64+0x86/0x230
[   31.107570]  kunit_try_run_case+0x1a5/0x480
[   31.107606]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.107658]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   31.107698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.107733]  ? __kthread_parkme+0x82/0x180
[   31.107762]  ? preempt_count_sub+0x50/0x80
[   31.107793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.107837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.107869]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.107901]  kthread+0x337/0x6f0
[   31.107928]  ? trace_preempt_on+0x20/0xc0
[   31.107959]  ? __pfx_kthread+0x10/0x10
[   31.107986]  ? _raw_spin_unlock_irq+0x47/0x80
[   31.108016]  ? calculate_sigpending+0x7b/0xa0
[   31.108048]  ? __pfx_kthread+0x10/0x10
[   31.108101]  ret_from_fork+0x116/0x1d0
[   31.108147]  ? __pfx_kthread+0x10/0x10
[   31.108192]  ret_from_fork_asm+0x1a/0x30
[   31.108258]  </TASK>
[   31.108281] 
[   31.125930] Allocated by task 261:
[   31.126513]  kasan_save_stack+0x45/0x70
[   31.126945]  kasan_save_track+0x18/0x40
[   31.127562]  kasan_save_alloc_info+0x3b/0x50
[   31.127935]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   31.128654]  remove_element+0x11e/0x190
[   31.128992]  mempool_alloc_preallocated+0x4d/0x90
[   31.129704]  mempool_uaf_helper+0x96/0x400
[   31.130129]  mempool_slab_uaf+0xea/0x140
[   31.130482]  kunit_try_run_case+0x1a5/0x480
[   31.130763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.131748]  kthread+0x337/0x6f0
[   31.132123]  ret_from_fork+0x116/0x1d0
[   31.132984]  ret_from_fork_asm+0x1a/0x30
[   31.133570] 
[   31.133854] Freed by task 261:
[   31.134443]  kasan_save_stack+0x45/0x70
[   31.134808]  kasan_save_track+0x18/0x40
[   31.135397]  kasan_save_free_info+0x3f/0x60
[   31.135850]  __kasan_mempool_poison_object+0x131/0x1d0
[   31.136625]  mempool_free+0x2ec/0x380
[   31.137075]  mempool_uaf_helper+0x11a/0x400
[   31.137442]  mempool_slab_uaf+0xea/0x140
[   31.137903]  kunit_try_run_case+0x1a5/0x480
[   31.138319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.138895]  kthread+0x337/0x6f0
[   31.139405]  ret_from_fork+0x116/0x1d0
[   31.139811]  ret_from_fork_asm+0x1a/0x30
[   31.140341] 
[   31.140566] The buggy address belongs to the object at ffff888102df3240
[   31.140566]  which belongs to the cache test_cache of size 123
[   31.141859] The buggy address is located 0 bytes inside of
[   31.141859]  freed 123-byte region [ffff888102df3240, ffff888102df32bb)
[   31.142880] 
[   31.143193] The buggy address belongs to the physical page:
[   31.143669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102df3
[   31.144536] flags: 0x200000000000000(node=0|zone=2)
[   31.145021] page_type: f5(slab)
[   31.145415] raw: 0200000000000000 ffff888102de7500 dead000000000122 0000000000000000
[   31.146003] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   31.146575] page dumped because: kasan: bad access detected
[   31.147404] 
[   31.147791] Memory state around the buggy address:
[   31.148427]  ffff888102df3100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.148975]  ffff888102df3180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.149737] >ffff888102df3200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   31.150419]                                            ^
[   31.150731]  ffff888102df3280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.151726]  ffff888102df3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.152344] ==================================================================
[   31.009907] ==================================================================
[   31.010595] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   31.011258] Read of size 1 at addr ffff888102dcfe00 by task kunit_try_catch/257
[   31.011777] 
[   31.012119] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   31.012238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.012270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.012350] Call Trace:
[   31.012398]  <TASK>
[   31.012439]  dump_stack_lvl+0x73/0xb0
[   31.012519]  print_report+0xd1/0x650
[   31.012604]  ? __virt_addr_valid+0x1db/0x2d0
[   31.012670]  ? mempool_uaf_helper+0x392/0x400
[   31.012728]  ? kasan_complete_mode_report_info+0x64/0x200
[   31.012818]  ? mempool_uaf_helper+0x392/0x400
[   31.012879]  kasan_report+0x141/0x180
[   31.012942]  ? mempool_uaf_helper+0x392/0x400
[   31.013013]  __asan_report_load1_noabort+0x18/0x20
[   31.013070]  mempool_uaf_helper+0x392/0x400
[   31.013126]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   31.013186]  ? kasan_save_track+0x18/0x40
[   31.013271]  ? kasan_save_alloc_info+0x3b/0x50
[   31.013329]  ? kasan_save_stack+0x45/0x70
[   31.013392]  mempool_kmalloc_uaf+0xef/0x140
[   31.013474]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   31.013535]  ? __pfx_mempool_kmalloc+0x10/0x10
[   31.013615]  ? __pfx_mempool_kfree+0x10/0x10
[   31.013679]  ? __pfx_read_tsc+0x10/0x10
[   31.013740]  ? ktime_get_ts64+0x86/0x230
[   31.013809]  kunit_try_run_case+0x1a5/0x480
[   31.013858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.013891]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   31.013926]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.013958]  ? __kthread_parkme+0x82/0x180
[   31.013987]  ? preempt_count_sub+0x50/0x80
[   31.014018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.014049]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.014081]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.014113]  kthread+0x337/0x6f0
[   31.014139]  ? trace_preempt_on+0x20/0xc0
[   31.014170]  ? __pfx_kthread+0x10/0x10
[   31.014197]  ? _raw_spin_unlock_irq+0x47/0x80
[   31.014268]  ? calculate_sigpending+0x7b/0xa0
[   31.014301]  ? __pfx_kthread+0x10/0x10
[   31.014328]  ret_from_fork+0x116/0x1d0
[   31.014355]  ? __pfx_kthread+0x10/0x10
[   31.014381]  ret_from_fork_asm+0x1a/0x30
[   31.014423]  </TASK>
[   31.014438] 
[   31.027188] Allocated by task 257:
[   31.027607]  kasan_save_stack+0x45/0x70
[   31.028063]  kasan_save_track+0x18/0x40
[   31.028467]  kasan_save_alloc_info+0x3b/0x50
[   31.028910]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   31.029514]  remove_element+0x11e/0x190
[   31.029853]  mempool_alloc_preallocated+0x4d/0x90
[   31.030337]  mempool_uaf_helper+0x96/0x400
[   31.030653]  mempool_kmalloc_uaf+0xef/0x140
[   31.031081]  kunit_try_run_case+0x1a5/0x480
[   31.031355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.031765]  kthread+0x337/0x6f0
[   31.032169]  ret_from_fork+0x116/0x1d0
[   31.032688]  ret_from_fork_asm+0x1a/0x30
[   31.033102] 
[   31.033324] Freed by task 257:
[   31.033592]  kasan_save_stack+0x45/0x70
[   31.033975]  kasan_save_track+0x18/0x40
[   31.034263]  kasan_save_free_info+0x3f/0x60
[   31.034516]  __kasan_mempool_poison_object+0x131/0x1d0
[   31.035029]  mempool_free+0x2ec/0x380
[   31.035467]  mempool_uaf_helper+0x11a/0x400
[   31.035987]  mempool_kmalloc_uaf+0xef/0x140
[   31.036431]  kunit_try_run_case+0x1a5/0x480
[   31.036868]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.037177]  kthread+0x337/0x6f0
[   31.037567]  ret_from_fork+0x116/0x1d0
[   31.038011]  ret_from_fork_asm+0x1a/0x30
[   31.038470] 
[   31.038701] The buggy address belongs to the object at ffff888102dcfe00
[   31.038701]  which belongs to the cache kmalloc-128 of size 128
[   31.039306] The buggy address is located 0 bytes inside of
[   31.039306]  freed 128-byte region [ffff888102dcfe00, ffff888102dcfe80)
[   31.040449] 
[   31.040765] The buggy address belongs to the physical page:
[   31.041204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102dcf
[   31.041620] flags: 0x200000000000000(node=0|zone=2)
[   31.042165] page_type: f5(slab)
[   31.042613] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   31.043406] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.044071] page dumped because: kasan: bad access detected
[   31.044401] 
[   31.044523] Memory state around the buggy address:
[   31.045021]  ffff888102dcfd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.045854]  ffff888102dcfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.046398] >ffff888102dcfe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.046756]                    ^
[   31.047009]  ffff888102dcfe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.047733]  ffff888102dcff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.048481] ==================================================================